نتایج جستجو برای: based detection

تعداد نتایج: 3322688  

2015
Anamaria RĂDOI Dan Alexandru STOICHESCU Anamaria Rădoi Dan Alexandru Stoichescu

Object detection is still a very active field in Computer Vision. Until now, part based models proved to be one of the most interesting and successful approaches in object and pedestrian detection. The method applies a machine learning approach not to the input images themselves, but to histograms of gradients. However, its performances are still limited when compared to what humans can do. The...

2010

Shape and texture are two fundamental properties of objects. The use of texture (i.e. 2D surface colouration), or appearance, for object detection, recognition and registration has been well studied, shape (in 3D) less so. However, the increasing prevalence of depth sensors and the diminishing returns to be had from appearance alone have seen a surge in shape-based methods. In this work we inve...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Chin-Tser Huang Jeff Janies

Anomaly-based intrusion detection systems have the ability to detect novel attacks, but when applied in real-time detection, they face the challenges of producing many false alarms and failing to match with the high speed of modern networks due to their computationally demanding algorithms. In this paper, we present Fates, an anomaly-based NIDS designed to alleviate the two challenges. Fates vi...

2013
Manoj K. Sabnis Manoj Kumar Shukla

Location Based Service Domain offers various services to applications like Navigation, Traffic Surveillance etc. One of the major services of this domain is the tracking moving objects. This service is implemented as system design approach having inputs as photos or videos. These inputs have many entities like the object of interest and entities of confusion .One such entity of our interest whi...

2015
Amr S. Abed T. Charles Clancy David S. Levy

Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a realtime host-based intrusion detection system that can be used to passively detect malfeasance against applications within ...

2013
Goverdhan Reddy Jidiga P Sammulal

Security of computer systems and information in flow is essential to acceptance for every network user utilities Now the standalone computer and internets are exposed to an increasing number of security threats with new types of attacks continuously appearing. For this to develop a robust, flexible and adaptive security oriented approaches is a severe challenge. In this context, anomaly based i...

Journal: :IJISP 2010
Ran Tao Li Yang Lu Peng Bin Li

Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has ...

2010
Martí Navarro Emilio Corchado Vicente Julián Álvaro Herrero

This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time processing and response. The original formulation of MOVICAB-IDS combines different Computational Intelligence techniques within a multiagent system to perform Intrusion Detection in dynamic computer networks. This work extends the ...

Journal: :Journal of Statistical Computation and Simulation 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید