Sciweavers

329 search results - page 51 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
ISM
2005
IEEE
91views Multimedia» more  ISM 2005»
14 years 1 months ago
Research on the Discrimination of Pornographic and Bikini Images
Our research extends the general technologies detecting pornographic images to prevent the benign images whose content is approximate with the pornographic ones from being screene...
Yushi Wang, Weiqiang Wang, Wen Gao
DATAMINE
2010
189views more  DATAMINE 2010»
13 years 7 months ago
A game-theoretic framework to identify overlapping communities in social networks
In this paper, we introduce a game-theoretic framework to address the community detection problem based on the structures of social networks. We formulate the dynamics of community...
Wei Chen, Zhenming Liu, Xiaorui Sun, Yajun Wang
ICIP
2009
IEEE
14 years 8 months ago
Corner-based Background Segmentation Using Adaptive Resonance Theory
A correct video segmentation, namely the detection of moving objects within a scene plays a very important role in many application in safety, surveillance, trafic monitoring and ...
IWIA
2005
IEEE
14 years 1 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
AINA
2007
IEEE
14 years 1 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...