Sciweavers

103 search results - page 7 / 21
» Anomaly Detection through Registration
Sort
View
ISCC
2006
IEEE
169views Communications» more  ISCC 2006»
14 years 22 days ago
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks
In this paper, an anomaly detection approach that fuses data gathered from different nodes in a distributed wireless sensor network is proposed and evaluated. The emphasis of this...
Vasilis Chatzigiannakis, Symeon Papavassiliou, Mar...
ACSAC
2004
IEEE
13 years 10 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ICPR
2010
IEEE
13 years 4 months ago
Tracking Ships from Fast Moving Camera through Image Registration
This paper presents an algorithm that detects and tracks marine vessels in video taken by a non-stationary camera installed on an untethered buoy. 1 The video is characterized by ...
Sergiy Fefilatyev, Dmitry B. Goldgof, Chad Lembke
JPDC
2006
129views more  JPDC 2006»
13 years 6 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
WISTP
2010
Springer
14 years 1 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...