Sciweavers

799 search results - page 91 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
ROBOCUP
1999
Springer
141views Robotics» more  ROBOCUP 1999»
14 years 3 days ago
A Segmentation System for Soccer Robot Based on Neural Networks
An innovative technique for segmentation of color images is proposed. The technique implements an approach based on thresholding of the hue histogram. A new function for detecting...
Carmelo Amoroso, Antonio Chella, Vito Morreale, Pi...
ICCV
2003
IEEE
14 years 1 months ago
An automatic drowning detection surveillance system for challenging outdoor pool environments
Automatically understanding events happening at a site is the ultimate goal of visual surveillance system. This paper investigates the challenges faced by automated surveillance s...
How-Lung Eng, Kar-Ann Toh, Alvin Harvey Kam, Junxi...
ISNN
2005
Springer
14 years 1 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
IMC
2004
ACM
14 years 1 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese