Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
In image retrieval, most existing approaches that incorporate local features produce high dimensional vectors, which lead to a high computational and data storage cost. Moreover, ...
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
We present a novel categorical object detection scheme that uses only local contour-based features. A two-stage, partially supervised learning architecture is proposed: a rudiment...
Many successful feature detectors and descriptors exist for 2D intensity images. However, obtaining the same effectiveness in the domain of 3D objects has proven to be a more elusi...