Sciweavers

2279 search results - page 245 / 456
» Robust Circle Detection
Sort
View
CCS
1999
ACM
15 years 9 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
DIMVA
2008
15 years 6 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
JFR
2010
94views more  JFR 2010»
14 years 11 months ago
Passive sensor evaluation for unmanned ground vehicle mud detection
Detecting mud hazards is a significant challenge to unmanned ground vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may need to be...
Arturo L. Rankin, Larry H. Matthies
AINA
2004
IEEE
15 years 8 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
ACSW
2006
15 years 6 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark