Sciweavers

988 search results - page 149 / 198
» Intrusion Detection with Neural Networks
Sort
View
ECRIME
2007
13 years 12 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
RAS
2007
113views more  RAS 2007»
13 years 7 months ago
Visual novelty detection with automatic scale selection
This paper presents experiments with an autonomous inspection robot, whose task was to highlight novel features in its environment from camera images. The experiments used two dif...
Hugo Vieira Neto, Ulrich Nehmzow
IJCNN
2006
IEEE
14 years 2 months ago
Prototype based outlier detection
— Outliers refer to “minority” data that are different from most other data. They usually disturb data mining process. But, sometimes they provide valuable information. Thus,...
Seungtaek Kim, Sungzoon Cho
MVA
2007
153views Computer Vision» more  MVA 2007»
13 years 7 months ago
An image-based feature tracking algorithm for real-time measurement of clad height
This paper presents a novel algorithm for real-time detection of clad height in laser cladding which is known as a layered manufacturing technique. A realtime measurement of clad g...
Mehrdad Iravani-Tabrizipour, Ehsan Toyserkani
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
14 years 29 days ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel