Sciweavers

800 search results - page 115 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
WACV
2008
IEEE
14 years 3 months ago
Multi-Pose Face Detection with Asymmetric Haar Features
In this paper we present a system for multi-pose face detection. Our system presents three main contributions. First, we introduce the use of asymmetric Haar features. Asymmetric ...
Geovany A. Ramírez, Olac Fuentes
ICAI
2010
13 years 6 months ago
A Sensor Network System for Event Attribution in Multi-user Home Environment
- This paper presents a sensor network system for detecting multiple user activity in a home environment. Recognizing Activities of Daily living (ADLs) by deploying sensors in the ...
Md. Kamrul Hasan, Manhyung Han, Sungyoung Lee, You...
AI
2008
Springer
14 years 3 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 9 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé

Lecture Notes
404views
15 years 6 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain