Sciweavers

268 search results - page 3 / 54
» Locating Hidden Groups in Communication Networks Using Hidde...
Sort
View
DSOM
2009
Springer
14 years 2 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
23
Voted
IVC
2002
148views more  IVC 2002»
13 years 7 months ago
Detecting lameness using 'Re-sampling Condensation' and 'multi-stream cyclic hidden Markov models'
A system for the tracking and classification of livestock movements is presented. The combined `tracker-classifier' scheme is based on a variant of Isard and Blakes `Condensa...
Derek R. Magee, Roger D. Boyle
ICIP
2004
IEEE
14 years 9 months ago
A hidden markov model framework for traffic event detection using video features
We present a novel approach for highway traffic event detection. Our algorithm extracts features directly from the compressed video and automatically detects traffic events using ...
Xiaokun Li, Fatih Murat Porikli