Sciweavers

103 search results - page 6 / 21
» Anomaly Detection through Registration
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 6 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ICIP
2004
IEEE
14 years 8 months ago
Integrated registration of dynamic renal perfusion MR images
This paper presents an integrated image registration algorithm to correct the motion induced by patient breathing for dynamic renal perfusion MR images. Registration of kidneys th...
José M. F. Moura, Marie-Pierre Jolly, Ying ...
ICARIS
2007
Springer
14 years 26 days ago
Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 1 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
COMCOM
2004
79views more  COMCOM 2004»
13 years 6 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...