Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Linux Intrusion Detection System

Known as: LIDS, LinuxIntrusionDetectionSystem 
Incomputer security, the Linux Intrusion Detection System (LIDS) is a patch to the Linux kernel and associated administrativetools that enhances the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Person re-identification across cameras remains a very challenging problem, especially when there are no overlapping fields of… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2016
2016
In recent years, sophisticated image-based reconstruction methods for the human face have been developed. These methods capture… Expand
  • figure 3
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Abstract Avoiding the use of complicated pre-processing steps such as accurate face and body part segmentation or image… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Owing to visual ambiguities and disparities, person re-identification methods inevitably produce sub optimal rank-list, which… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 10
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In many surveillance systems there is a requirement todetermine whether a given person of interest has alreadybeen observed over… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In a crowded public space, people often walk in groups, either with people they know or strangers. Associating a group of people… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Watermarking models a copyright protection mechanism where an original source sequence or "covertext" is modified before… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We study the problem of statistical multiplexing of cell streams that have correlations at multiple time-scales. Each stream is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1993
1993
Multinode broadcast (MNB) in a hypercube and in a ring network of processors is considered. It is assumed that the lengths of the… Expand
  • figure 1
  • figure 2
Is this relevant?