Sciweavers

912 search results - page 88 / 183
» Anomaly
Sort
View
CORR
2006
Springer
152views Education» more  CORR 2006»
13 years 9 months ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle
JSAC
2006
95views more  JSAC 2006»
13 years 8 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...

Publication
226views
12 years 7 months ago
Modelling Multi-object Activity by Gaussian Processes
We present a new approach for activity modelling and anomaly detection based on non-parametric Gaussian Process (GP) models. Specifically, GP regression models are formulated to l...
Chen Change Loy, Tao Xiang, Shaogang Gong
ICIP
2001
IEEE
14 years 10 months ago
(Automatic) target detection in synthetic aperture radar imagery via terrain recognition
Surveillance of large areas of the Earths surface is often undertaken with low resolution synthetic aperture radar (SAR) imagery from either a satellite or a plane. There is a nee...
Rupert Paget, John Homer, Donald Crisp
ICSE
2009
IEEE-ACM
14 years 9 months ago
Discovering and representing systematic code changes
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
Miryung Kim, David Notkin