This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
This Paper presents a platform to mine epileptiform activity from Electroencephalograms (EEG) by combining the methodologies of Deterministic Finite Automata (DFA) and Knowledge Di...
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...
This paper exploits the context of natural dynamic scenes
for human action recognition in video. Human actions
are frequently constrained by the purpose and the physical
propert...
Marcin Marszalek (INRIA), Ivan Laptev (INRIA), Cor...