Sciweavers

2236 search results - page 354 / 448
» Intrusion detection techniques and approaches
Sort
View
TIP
2008
125views more  TIP 2008»
13 years 9 months ago
Segmentation by Fusion of Histogram-Based K-Means Clusters in Different Color Spaces
Abstract--This paper presents a new, simple, and efficient segmentation approach, based on a fusion procedure which aims at combining several segmentation maps associated to simple...
Max Mignotte
GLOBECOM
2010
IEEE
13 years 7 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
ICB
2009
Springer
158views Biometrics» more  ICB 2009»
13 years 7 months ago
3D Face Recognition Using Joint Differential Invariants
Stemming from a sound mathematical framework dating back to the beginning of the 20th century, this paper introduces a novel approach for 3D face recognition. The proposed techniqu...
Marinella Cadoni, Manuele Bicego, Enrico Grosso
ESORICS
2009
Springer
14 years 1 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
3DPVT
2006
IEEE
295views Visualization» more  3DPVT 2006»
13 years 11 months ago
Efficient Sparse 3D Reconstruction by Space Sweeping
This paper introduces a feature based method for the fast generation of sparse 3D point clouds from multiple images with known pose. We extract sub-pixel edge elements (2D positio...
Joachim Bauer, Christopher Zach, Horst Bischof