Sciweavers

1503 search results - page 89 / 301
» Detecting Anomalies in Graphs
Sort
View
ACSAC
2008
IEEE
15 years 11 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
WACV
2012
IEEE
13 years 12 months ago
LOST: Longterm Observation of Scenes (with Tracks)
We introduce the Longterm Observation of Scenes (with Tracks) dataset. This dataset comprises videos taken from streaming outdoor webcams, capturing the same half hour, each day, ...
Austin Abrams, Jim Tucek, Joshua Little, Nathan Ja...
MICCAI
2009
Springer
15 years 6 months ago
Optimal Graph Search Segmentation Using Arc-weighted Graph for Simultaneous Surface Detection of Bladder and Prostate
We present a novel method for globally optimal surface segmentation of multiple mutually interacting objects, incorporating both edge and shape knowledge in a 3-D graph-theoretic a...
Qi Song, Xiaodong Wu, Yunlong Liu, Mark Smith, Joh...
ICCSA
2005
Springer
15 years 10 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das
AAAI
2007
15 years 6 months ago
Parallel Structured Duplicate Detection
We describe a novel approach to parallelizing graph search using structured duplicate detection. Structured duplicate detection was originally developed as an approach to external...
Rong Zhou, Eric A. Hansen