Sciweavers

51 search results - page 5 / 11
» Isolating Intrusions by Automatic Experiments
Sort
View
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 2 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
RAID
2007
Springer
14 years 1 months ago
Advanced Allergy Attacks: Does a Corpus Really Help?
Abstract. As research in automatic signature generators (ASGs) receives more attention, various attacks against these systems are being identified. One of these attacks is the “...
Simon P. Chung, Aloysius K. Mok
ICDAR
2003
IEEE
14 years 23 days ago
Mathematical Formulas Extraction
As a universal technical language, mathematics has been widely applied in many fields, and it is more accurate than any other languages in describing information. Therefore, numer...
Jianming Jin, Xionghu Han, Qingren Wang
ICDAR
1999
IEEE
13 years 11 months ago
Cursive Character Detection using Incremental Learning
This paper describes a new hybrid architecture for an artificial neural network classifier that enables incremental learning. The learning algorithm of the proposed architecture d...
Jean-François Hébert, Marc Parizeau,...
BMCBI
2008
115views more  BMCBI 2008»
13 years 7 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...