Sciweavers

988 search results - page 82 / 198
» Intrusion Detection with Neural Networks
Sort
View
DIMVA
2009
13 years 9 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
CCIA
2005
Springer
13 years 10 months ago
Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks
Abstract. This paper presents a new feature selection method and an outliers detection algorithm. The presented method is based on using a genetic algorithm combined with a problem...
Agusti Solanas, Enrique Romero, Sergio Góme...
DMIN
2006
221views Data Mining» more  DMIN 2006»
13 years 9 months ago
Color Image Segmentation Using Pulse-Coupled Neural Network for Locusts Detection
- Pulse-coupled neural network (PCNN) is different from traditional artificial neural networks, which can be applied in many fields, such as image processing. A crucial step in dev...
Xuemei Xiong, Yiming Wang, Xiaochao Zhang
CVPR
1996
IEEE
14 years 10 months ago
Neural Network-Based Face Detection
Henry A. Rowley, Shumeet Baluja, Takeo Kanade
AVSS
2003
IEEE
14 years 1 months ago
A Distributed Visual Surveillance System
We present a distributed vision-based surveillance system. The system acquires and processes grey level images through one or multiple Camera Units monitoring certain area(s) via ...
Xiaojing Yuan, Zehang Sun, Yaakov L. Varol, George...