—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
This paper presents the evaluation results of a system for tracking humans in surveillance videos. Moving blobs are detected based on adaptive background modeling. A shape based mu...
Bo Wu, Vivek Kumar Singh, C.-H. Kuo, Li Zhang, Sun...
The evaluation results of a system for tracking humans in surveillance videos are presented. Moving blobs are detected based on adaptive background modeling. A shape based multi-vi...
Bo Wu, Xuefeng Song, Vivek Kumar Singh, Ram Nevati...
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this...