Showing 181 - 200 results of 24,170 for search '"detective"', query time: 0.10s Refine Results
  1. 181

    Using deep learning for detecting BotCloud by Guang KOU, Guang-ming TANG, Shuo WANG, Hai-tao SONG, Yuan BIAN

    Published 2016-11-01
    “…The differences of the basic network flow characteristics between BotCloud and normal cloud services were not obvious, and this led to the inefficiency of the method in BotCloud detection based on network flow characteristics analysis. …”
    Get full text
    Article
  2. 182

    Multi-Granularity User Anomalous Behavior Detection by Wenying Feng, Yu Cao, Yilu Chen, Ye Wang, Ning Hu, Yan Jia, Zhaoquan Gu

    Published 2024-12-01
    Subjects: “…insider threat detection…”
    Get full text
    Article
  3. 183

    Modelling Oil-Spill Detection with Swarm Drones by F. Aznar, M. Sempere, M. Pujol, R. Rizo, M. J. Pujol

    Published 2014-01-01
    “…One of them is the detection and monitoring of pollutants to delimit their perimeter and area accurately. …”
    Get full text
    Article
  4. 184

    Tumor detection on bronchoscopic images by unsupervised learning by Qingqing Liu, Haoliang Zheng, Zhiwei Jia, Zhihui Shi

    Published 2025-01-01
    “…To address this issue, a datasets for intratracheal tumor detection has been constructed to simulate the diagnostic level of experienced specialists, and a Knowledge Distillation-based Memory Feature Unsupervised Anomaly Detection (KD-MFAD) model was proposed to learn from this simulated experience. …”
    Get full text
    Article
  5. 185

    Advanced Imaging Modalities in the Detection of Cerebral Vasospasm by Jena N. Mills, Vivek Mehta, Jonathan Russin, Arun P. Amar, Anandh Rajamohan, William J. Mack

    Published 2013-01-01
    “…Advances in imaging have provided clinicians with a multifaceted approach to assist in the detection of cerebral vasospasm and the diagnosis of delayed ischemic neurologic deficits (DIND). …”
    Get full text
    Article
  6. 186
  7. 187
  8. 188
  9. 189
  10. 190
  11. 191

    Channeled Polarimetry for Magnetic Field/Current Detection by Georgi Dyankov, Petar Kolev, Tinko A. Eftimov, Evdokiya O. Hikova, Hristo Kisov

    Published 2025-01-01
    “…It is shown that in contrast to other methods, this method allows the detection of the phase shift caused by Faraday rotation alone, making the detection independent of temperature. …”
    Get full text
    Article
  12. 192
  13. 193

    Floer homology and non-fibered knot detection by John A. Baldwin, Steven Sivek

    Published 2025-01-01
    “…We prove for the first time that knot Floer homology and Khovanov homology can detect non-fibered knots and that HOMFLY homology detects infinitely many knots; these theories were previously known to detect a mere six knots, all fibered. …”
    Get full text
    Article
  14. 194
  15. 195

    Survey of software anomaly detection based on deception by Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO

    Published 2022-02-01
    “…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
    Get full text
    Article
  16. 196

    Detection of circular permutations by Protein Language Models by Yue Hu, Bin Huang, Chun Zi Zang, Jia Jie Xu

    Published 2025-01-01
    “…Protein circular permutations are crucial for understanding protein evolution and functionality. Traditional detection methods face challenges: sequence-based approaches struggle with detecting distant homologs, while structure-based approaches are limited by the need for structure generation and often treat proteins as rigid bodies. …”
    Get full text
    Article
  17. 197
  18. 198

    Detection of Bacterial Endospores in Soil by Terbium Fluorescence by Andrea Brandes Ammann, Linda Kölle, Helmut Brandl

    Published 2011-01-01
    “…Our study might provide a basis for the detection of “hot spots” of bacterial spores in soil.…”
    Get full text
    Article
  19. 199
  20. 200

    Design of Unmanned Vehicle System for Disaster Detection by Ming-Chih Chen, Chien-Hsing Chen, Ming-Sheng Huang, Jheng-Yu Ciou, Guo-Tai Zhang

    Published 2015-04-01
    “…The vehicle system is capable of detecting a variety of gases by the sensors deployed on it. …”
    Get full text
    Article