Sciweavers

94 search results - page 9 / 19
» Directions in Incident Detection and Response
Sort
View
MOBICOM
2000
ACM
13 years 12 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 7 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
ICIP
2008
IEEE
14 years 2 months ago
Reliable interest point detection under large illumination variations
This appendix proves the illumination robustness of the proposed corner detector over the Harris corner detector. I. HARRIS CORNER DETECTOR The Harris corner detector [1] is based...
Murat Gevrekci, Bahadir K. Gunturk
RAID
2007
Springer
14 years 1 months ago
Comparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
Kenneth L. Ingham, Hajime Inoue
SCIA
2005
Springer
211views Image Analysis» more  SCIA 2005»
14 years 1 months ago
Perception-Action Based Object Detection from Local Descriptor Combination and Reinforcement Learning
This work proposes to learn visual encodings of attention patterns that enables sequential attention for object detection in real world environments. The system embeds a saccadic d...
Lucas Paletta, Gerald Fritz, Christin Seifert