Skip to search formSkip to main contentSkip to account menu

Linux Intrusion Detection System

Known as: LIDS, LinuxIntrusionDetectionSystem 
Incomputer security, the Linux Intrusion Detection System (LIDS) is a patch to the Linux kernel and associated administrativetools that enhances the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Person re-identification across cameras remains a very challenging problem, especially when there are no overlapping fields of… 
Highly Cited
2016
Highly Cited
2016
In recent years, sophisticated image-based reconstruction methods for the human face have been developed. These methods capture… 
Highly Cited
2013
Highly Cited
2013
Owing to visual ambiguities and disparities, person re-identification methods inevitably produce sub optimal rank-list, which… 
Highly Cited
2010
Highly Cited
2010
In many surveillance systems there is a requirement todetermine whether a given person of interest has alreadybeen observed over… 
Highly Cited
2009
Highly Cited
2009
In a crowded public space, people often walk in groups, either with people they know or strangers. Associating a group of people… 
Highly Cited
2009
Highly Cited
2009
We propose a novel technique for head pose classification in crowded public space under poor lighting and in low-resolution video… 
2006
2006
With increasing usage of Linux in various computing environments, a lot of security vulnerabilities are being discovered in GNU… 
Highly Cited
1994
Highly Cited
1994
The structure of dual ascent methods is particularly well-suited for taking advantage of good initial dual solutions of minimum… 
Highly Cited
1993
Highly Cited
1993
The central theme of the thesis is that the failure of image motion algorithms is due primarily to the use of vector fields as a…