Sciweavers

220 search results - page 29 / 44
» Intrinsic Plagiarism Detection
Sort
View
COMAD
2009
13 years 8 months ago
Categorizing Concepts for Detecting Drifts in Stream
Mining evolving data streams for concept drifts has gained importance in applications like customer behavior analysis, network intrusion detection, credit card fraud detection. Se...
Sharanjit Kaur, Vasudha Bhatnagar, Sameep Mehta, S...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 7 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
RAID
2010
Springer
13 years 6 months ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 1 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
ICCV
1995
IEEE
13 years 11 months ago
Geodesic Active Contours
A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the imag...
Vicent Caselles, Ron Kimmel, Guillermo Sapiro