Sciweavers

145 search results - page 19 / 29
» Detecting Novel Scans Through Pattern Anomaly Detection
Sort
View
INFOCOM
2011
IEEE
12 years 10 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
ASSETS
2007
ACM
13 years 10 months ago
Accessible spaces: navigating through a marked environment with a camera phone
We demonstrate a system designed to assist a visually impaired individual while moving in an unfamiliar environment. Small and economical color markers are placed in key locations...
Kee-Yip Chan, Roberto Manduchi, James Coughlan
AIPR
2006
IEEE
14 years 24 days ago
Recovering Spheres from 3D Point Data
The National Institute of Standards and Technology is involved in developing standard protocols for the performance evaluation of 3D imaging systems, which include laser scanners ...
Christoph Witzgall, Geraldine S. Cheok, Anthony J....
ISMIS
2005
Springer
14 years 6 days ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
ICPR
2004
IEEE
14 years 7 months ago
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images
Feature subset selection, applied as a pre-processing step to machine learning, is valuable in dimensionality reduction, eliminating irrelevant data and improving classifier perfo...
Mithun Nagendra Prasad, Arcot Sowmya, Inge Koch