Sciweavers

190 search results - page 24 / 38
» From Monitoring Templates to Security Monitoring and Threat ...
Sort
View
IJCAI
1993
13 years 9 months ago
Automated Trend Detection with Alternate Temporal Hypotheses
We have written a prototype computer program called TrenDx for automated trend detection during process monitoring. The program uses a representation called trend templates that d...
Ira J. Haimowitz, Isaac S. Kohane
CVIU
2006
142views more  CVIU 2006»
13 years 7 months ago
Robust target detection and tracking through integration of motion, color, and geometry
Vision-based tracking is a basic elementary task in many computer vision-based applications such as video surveillance and monitoring, sensing and navigation in robotics, video co...
Harini Veeraraghavan, Paul R. Schrater, Nikolaos P...
CSDA
2008
147views more  CSDA 2008»
13 years 7 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
AVSS
2006
IEEE
14 years 1 months ago
Multi-view Intelligent Vehicle Surveillance System
This paper presents a multi-view intelligent surveillance system used for the automatic tracking and monitoring of vehicles in a short-term parking lane. The system has the abilit...
Simon Denman, Clinton Fookes, Jamie Cook, Chris Da...
CCS
2009
ACM
14 years 8 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...