Results 11 - 20
of
7,149
PFA = Probability of False Alarm
"... This paper presents an implementation of an IIMMW simulator for use in developing a multisensory fusion methodology for Helicopter DNAW operations. The functional modeling approach based on power representation of the simulated sensors is adopted in the simulation. The detailed power and attenuation ..."
Abstract
- Add to MetaCart
and attenuation models are described and the received power from the target and background is converted into intensity values and rendered as an image. The effect of various weather conditions including rain, fog, snow and dust are considered. As a result, some examples of simulated MMW and IR images generated
Autograph: Toward automated, distributed worm signature detection
- In Proceedings of the 13th Usenix Security Symposium
, 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract
-
Cited by 362 (3 self)
- Add to MetaCart
of novel Internet worms. Generation of the worm signatures required by an IDS—the byte patterns sought in monitored traffic to identify worms—today entails non-trivial human labor, and thus significant delay: as network operators detect anomalous behavior, they communicate with one another and manually
False Alarm Probability
"... Fig. 3. ROC for standard and robust LRT with different contamination parameters. V. CONCLUSION This correspondence has described a procedure for testing which nonlinear dynamic model from a finite class generated a particular random process. The procedure uses extended Kalman filters (EKF’s) tuned t ..."
Abstract
- Add to MetaCart
Fig. 3. ROC for standard and robust LRT with different contamination parameters. V. CONCLUSION This correspondence has described a procedure for testing which nonlinear dynamic model from a finite class generated a particular random process. The procedure uses extended Kalman filters (EKF’s) tuned
Pragmatics of measuring recognition memory: Applications to dementia and amnesia.
- Journal of Experimental Psychology: General,
, 1988
"... SUMMARY This article has two purposes. The first is to describe four theoretical models of yesno recognition memory and present their associated measures of discrimination and response bias. These models are then applied to a set of data from normal subjects to determine which pairs of discriminati ..."
Abstract
-
Cited by 326 (0 self)
- Add to MetaCart
;yes") or new (by responding "no"). Performance on a yesno recognition test is summarized by two measures: the hit rate, the probability that the subject classifies an old item as old, and the false alarm rate, the probability that the subject classifies a new item as old. A given model
CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows In C
, 2000
"... Erroneous string manipulations are a major source of software defects in C programs yielding vulnerabilities which are exploited by software viruses. We present C String Static Verifyer (CSSV), a tool that statically uncovers all string manipulation errors. Being a conservative tool, it reports all ..."
Abstract
-
Cited by 137 (6 self)
- Add to MetaCart
such errors at the expense of sometimes generating false alarms. Fortunately, only a small number of false alarms are reported, thereby proving that statically reducing software vulnerability is achievable. CSSV handles large programs by analyzing each procedure separately. For this, procedures
Polygraph: Automatically generating signatures for polymorphic worms
- In Proceedings of the IEEE Symposium on Security and Privacy
, 2005
"... It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match poly ..."
Abstract
-
Cited by 275 (17 self)
- Add to MetaCart
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match
Sensing-throughput tradeoff for cognitive radio networks
- in Proc. IEEE Int. Conf. Commun.(ICC
, 2006
"... Abstract—In a cognitive radio network, the secondary users are allowed to utilize the frequency bands of primary users when these bands are not currently being used. To support this spectrum reuse functionality, the secondary users are required to sense the radio frequency environment, and once the ..."
Abstract
-
Cited by 291 (19 self)
- Add to MetaCart
and probability of false alarm. The higher the probability of detection, the better the primary users are protected. However, from the secondary users ’ perspec-tive, the lower the probability of false alarm, the more chances the channel can be reused when it is available, thus the higher the achievable
Statistical En-route Filtering of Injected False Data in Sensor Networks
- In INFOCOM
, 2004
"... In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject into the network large quantities of bogus sensing reports which, if undetected, would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors ..."
Abstract
-
Cited by 184 (2 self)
- Add to MetaCart
can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In this paper we present a Statistical En-route Filtering (SEF) mechanism that can detect and drop such false reports. SEF requires that each sensing report be validated by multiple
Pinpoint: Problem Determination in Large, Dynamic Internet Services
- In Proc. 2002 Intl. Conf. on Dependable Systems and Networks
, 2002
"... Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today's large, distributed, and dynamic application environments such as e-commerce systems. In this paper, we present a dynamic analysis methodology that automates problem ..."
Abstract
-
Cited by 298 (11 self)
- Add to MetaCart
Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today's large, distributed, and dynamic application environments such as e-commerce systems. In this paper, we present a dynamic analysis methodology that automates
Human detection using oriented histograms of flow and appearance
- In ECCV
, 2006
"... Abstract. Detecting humans in films and videos is a challenging problem owing to the motion of the subjects, the camera and the background and to variations in pose, appearance, clothing, illumination and background clutter. We develop a detector for standing and moving people in videos with possibl ..."
Abstract
-
Cited by 283 (20 self)
- Add to MetaCart
4400 human examples. The combined detector reduces the false alarm rate by a factor of 10 relative to the best appearance-based detector, for example giving false alarm rates of 1 per 20,000 windows tested at 8 % miss rate on our Test Set 1. 1
Results 11 - 20
of
7,149