Sciweavers

36 search results - page 2 / 8
» Investigating hidden Markov models capabilities in anomaly d...
Sort
View
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 8 months ago
High-Rate Quantization for the Neyman-Pearson Detection of Hidden Markov Processes
This paper investigates the decentralized detection of Hidden Markov Processes using the NeymanPearson test. We consider a network formed by a large number of distributed sensors....
Joffrey Villard, Pascal Bianchi, Eric Moulines, Pa...
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 8 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
EMMCVPR
2009
Springer
14 years 3 months ago
Clustering-Based Construction of Hidden Markov Models for Generative Kernels
Generative kernels represent theoretically grounded tools able to increase the capabilities of generative classification through a discriminative setting. Fisher Kernel is the fi...
Manuele Bicego, Marco Cristani, Vittorio Murino, E...
TIP
2010
119views more  TIP 2010»
13 years 3 months ago
Trajectory Classification Using Switched Dynamical Hidden Markov Models
This paper proposes an approach for recognizing human activities (more specifically, pedestrian trajectories) in video sequences, in a surveillance context. A system for automatic ...
Jacinto C. Nascimento, Mário A. T. Figueire...
ISSADS
2005
Springer
14 years 2 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...