Sciweavers

226 search results - page 11 / 46
» Intrusion Detection using Continuous Time Bayesian Networks
Sort
View
ICCV
2001
IEEE
14 years 9 months ago
Continuous Global Evidence-Based Bayesian Modality Fusion for Simultaneous Tracking of Multiple Objects
Robust, real-time tracking of objects from visual data requires probabilistic fusion of multiple visual cues. Previous approaches have either been ad hoc or relied on a Bayesian n...
Jamie Sherrah, Shaogang Gong
CN
1999
128views more  CN 1999»
13 years 7 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
BMCBI
2008
166views more  BMCBI 2008»
13 years 7 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
AINA
2009
IEEE
14 years 2 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 5 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002