Sciweavers

417 search results - page 23 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
CLEAR
2007
Springer
263views Biometrics» more  CLEAR 2007»
14 years 1 months ago
CLEAR'07 Evaluation of USC Human Tracking System for Surveillance Videos
This paper presents the evaluation results of a system for tracking humans in surveillance videos. Moving blobs are detected based on adaptive background modeling. A shape based mu...
Bo Wu, Vivek Kumar Singh, C.-H. Kuo, Li Zhang, Sun...
CLEAR
2006
Springer
190views Biometrics» more  CLEAR 2006»
13 years 11 months ago
Evaluation of USC Human Tracking System for Surveillance Videos
The evaluation results of a system for tracking humans in surveillance videos are presented. Moving blobs are detected based on adaptive background modeling. A shape based multi-vi...
Bo Wu, Xuefeng Song, Vivek Kumar Singh, Ram Nevati...
ICPR
2002
IEEE
14 years 21 days ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
ACSW
2004
13 years 9 months ago
A wavelet-based neuro-fuzzy system for data mining small image sets
Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this...
Brendon J. Woodford, Da Deng, George L. Benwell