Sciweavers

290 search results - page 37 / 58
» Attack detection in time series for recommender systems
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 1 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ICPR
2006
IEEE
14 years 9 months ago
Detection of Fence Climbing from Monocular Video
This paper presents a system that detects humans climbing fences. After extracting a binary blob contour, the system models the human with an extended star-skeleton representation...
Elden Yu, J. K. Aggarwal
EUC
2007
Springer
14 years 15 days ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
ECOI
2010
117views more  ECOI 2010»
13 years 8 months ago
Ensemble extraction for classification and detection of bird species
Advances in technology have enabled new approaches for sensing the environment and collecting data about the world. Once collected, sensor readings can be assembled into data stre...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 4 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson