Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
This paper compares different confidence measures for the results of statistical face recognition systems. The main applications of a confidence measure are rejection of unknown p...
Performances evaluation of image processing intermediate results in video based surveillance systems is extremely important due to the variety of approaches to this task. In this ...
Franco Oberti, Andrea Teschioni, Carlo S. Regazzon...
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Automatic Speech Recognition (ASR) systems continue to make errors during search when handling various phenomena including noise, pronunciation variation, and out of vocabulary (O...
Christopher M. White, Geoffrey Zweig, Lukas Burget...