Results 1 - 10
of
27,841
Face Recognition: A Literature Survey
, 2000
"... ... This paper provides an up-to-date critical survey of still- and video-based face recognition research. There are two underlying motivations for us to write this survey paper: the first is to provide an up-to-date review of the existing literature, and the second is to offer some insights into ..."
Abstract
-
Cited by 1363 (21 self)
- Add to MetaCart
... This paper provides an up-to-date critical survey of still- and video-based face recognition research. There are two underlying motivations for us to write this survey paper: the first is to provide an up-to-date review of the existing literature, and the second is to offer some insights into the studies of machine recognition of faces. To provide a comprehensive survey, we not only categorize existing recognition techniques but also present detailed descriptions of representative methods within each category. In addition,
A Virtual Machine Introspection Based Architecture for Intrusion Detection
- In Proc. Network and Distributed Systems Security Symposium
, 2003
"... Today's architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening in that host's software, but is highly susceptible to attack. On the other hand, if the IDS resides in the network, ..."
Abstract
-
Cited by 409 (5 self)
- Add to MetaCart
Today's architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening in that host's software, but is highly susceptible to attack. On the other hand, if the IDS resides in the network, it is more resistant to attack, but has a poor view of what is happening inside the host, making it more susceptible to evasion. In this paper we present an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance. We achieve this through the use of a virtual machine monitor. Using this approach allows us to isolate the IDS from the monitored host but still retain excellent visibility into the host's state. The VMM also offers us the unique ability to completely mediate interactions between the host software and the underlying hardware. We present a detailed study of our architecture, including Livewire, a prototype implementation. We demonstrate Livewire by implementing a suite of simple intrusion detection policies and using them to detect real attacks.
Insertion, evasion, and denial of service: Eluding network intrusion detection
, 1998
"... \Not everything that is counted counts, and not everything that counts can be counted." ..."
Abstract
-
Cited by 344 (0 self)
- Add to MetaCart
\Not everything that is counted counts, and not everything that counts can be counted."
Discriminant Adaptive Nearest Neighbor Classification
, 1994
"... Nearest neighbor classification expects the class conditional probabilities to be locally constant, and suffers from bias in high dimensions. We propose a locally adaptive form of nearest neighbor classification to try to ameliorate this curse of dimensionality. We use a local linear discriminant an ..."
Abstract
-
Cited by 322 (1 self)
- Add to MetaCart
analysis to estimate an effective metric for computing neighborhoods. We determine the local decision boundaries from centroid information, and then shrink neighborhoods in directions orthogonal to these local decision boundaries, and elongate them parallel to the boundaries. Thereafter, any neighborhood
The Value of a Statistical Life: A Critical Review of Market Estimates Throughout the World
- Journal of Risk and Uncertainty
, 2003
"... A substantial literature over the past thirty years has evaluated tradeoffs between money and fatality risks. These values in turn serve as estimates of the value of a statistical life. This article reviews more than 60 studies of mortality risk premiums from ten countries and approximately 40 studi ..."
Abstract
-
Cited by 266 (25 self)
- Add to MetaCart
A substantial literature over the past thirty years has evaluated tradeoffs between money and fatality risks. These values in turn serve as estimates of the value of a statistical life. This article reviews more than 60 studies of mortality risk premiums from ten countries and approximately 40 studies that present estimates of injury risk premiums. This critical review examines a variety of econometric issues, the role of unionization in risk premiums, and the effects of age on the value of a statistical life. Our meta-analysis indicates an income elasticity of the value of a statistical life from about 0.5 to 0.6. The paper also presents a detailed discussion of policy applications of these value of a statistical life estimates and related issues, including risk-risk analysis.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Speculative Parallel Pattern Matching
"... Abstract—Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature is a regular expression and represents an attack or a vulnerability. IPSs need to keep up with ever-increasing line speeds, which has lead to the use of custom hardware. A ..."
Abstract
- Add to MetaCart
Abstract—Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature is a regular expression and represents an attack or a vulnerability. IPSs need to keep up with ever-increasing line speeds, which has lead to the use of custom hardware. A major bottleneck that IPSs face is that they scan incoming packets one byte at a time, which limits their throughput and latency. In this paper, we present a method to search for arbitrary regular expressions by scanning multiple bytes in parallel using speculation. We break the packet in several chunks, opportunistically scan them in parallel and if the speculation is wrong, correct it later. We present algorithms that apply speculation in singlethreaded software running on commodity processors as well as algorithms for parallel hardware. Experimental results show that speculation leads to improvements in latency and throughput in both cases. Index Terms—low latency, parallel pattern matching, regular expressions, speculative pattern matching, multi-byte, multi-byte
Recent Developments in Human Motion Analysis
"... Visual analysis of human motion is currently one of the most active research topics in computer vision. This strong interest is driven by a wide spectrum of promising applications in many areas such as virtual reality, smart surveillance, perceptual interface, etc. Human motion analysis concerns the ..."
Abstract
-
Cited by 260 (3 self)
- Add to MetaCart
Visual analysis of human motion is currently one of the most active research topics in computer vision. This strong interest is driven by a wide spectrum of promising applications in many areas such as virtual reality, smart surveillance, perceptual interface, etc. Human motion analysis concerns the detection, tracking and recognition of people, and more generally, the understanding of human behaviors, from image sequences involving humans. This paper provides a comprehensive survey of research on computer vision based human motion analysis. The emphasis is on three major issues involved in a general human motion analysis system, namely human detection, tracking and activity understanding. Various methods for each issue are discussed in order to examine the state of the art. Finally, some research challenges and future directions are discussed.
Biometrics: A tool for information security
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
, 2006
"... Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims to be?, ” “Is this person authorized to use this facility?, ” or “Is he in the watchlist posted by the government? ” are routinely being posed in a variety of scenarios r ..."
Abstract
-
Cited by 173 (4 self)
- Add to MetaCart
solve issues pertaining to information security; 2) enumerating the fundamental challenges encountered by biometric systems in real-world applications; and 3) discussing solutions to address the problems of scalability and security in large-scale authentication systems.
Backtracking intrusions
, 2003
"... Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in ..."
Abstract
-
Cited by 239 (11 self)
- Add to MetaCart
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred
Results 1 - 10
of
27,841