Sciweavers

174 search results - page 5 / 35
» Study for Fusion of Different Sources to Determine Relevance
Sort
View
ACMSE
2005
ACM
14 years 1 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ACSAC
2004
IEEE
13 years 11 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
BMCBI
2008
110views more  BMCBI 2008»
13 years 7 months ago
Determining significance of pairwise co-occurrences of events in bursty sequences
Background: Event sequences where different types of events often occur close together arise, e.g., when studying potential transcription factor binding sites (TFBS, events) of ce...
Niina Haiminen, Heikki Mannila, Evimaria Terzi
ICASSP
2011
IEEE
12 years 11 months ago
Survey and evaluation of acoustic features for speaker recognition
This study seeks to quantify the effectiveness of a broad range of acoustic features for speaker identification and their impact in feature fusion. Sixteen different acoustic feat...
Aaron D. Lawson, Pavel Vabishchevich, Mark C. Hugg...
GLOBECOM
2007
IEEE
14 years 1 months ago
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Abstract— We study transmission schemes for lifetime maximization in wireless sensor networks. Specifically we consider the network where all the sensors observe uncorrelated si...
Xiaolu Zhang, Meixia Tao, Chun Sum Ng