Sciweavers

307 search results - page 20 / 62
» Host Based Intrusion Detection using Machine Learning
Sort
View
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 1 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
ICPR
2004
IEEE
14 years 8 months ago
Corner Detection Using Support Vector Machines
A support vector machine based algorithm for corner detection is presented. It is based on computing the direction of maximum gray-level change for each edge pixel in an image, an...
Malay K. Kundu, Minakshi Banerjee, Pabitra Mitra
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
CSREASAM
2003
13 years 9 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
ECCV
2006
Springer
14 years 9 months ago
Machine Learning for High-Speed Corner Detection
Abstract Where feature points are used in real-time frame-rate applications, a high-speed feature detector is necessary. Feature detectors such as SIFT (DoG), Harris and SUSAN are ...
Edward Rosten, Tom Drummond