Stroboscopic Real-Time Correlation Methods

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methods for Real - Time

Methods for Real-Time Bin-Picking Using 2D Vision Computer vision has proved to be a valuable asset in robot automated applications. One such application is known as bin-picking, in which a robot is used to automatically pick up a number of items from a container. In some cases these “bins” contain overlapping items or even unsorted heaps. In this paper two methods are presented that use only 2...

متن کامل

Real Time Video Analysis using Smart Phone Camera for Stroboscopic Image

Motion capturing and there by segmentation of the motion of any moving object from a sequence of continuous images or a video is not an exceptional task in computer vision area. Smart-phone camera application is an added integration for the development of such tasks and it also provides for a smooth testing. A new approach has been proposed for segmenting out the foreground moving object from t...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Real-Time Intrusion Detection Alert Correlation

Real-Time Intrusion Detection Alert Correlation

متن کامل

Real-Time Alert Correlation with Type Graphs

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenari...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions of the Society of Instrument and Control Engineers

سال: 1968

ISSN: 0453-4654

DOI: 10.9746/sicetr1965.4.61