Linux Intrusion Detection System

Known as: LIDS, LinuxIntrusionDetectionSystem 
Incomputer security, the Linux Intrusion Detection System (LIDS) is a patch to the Linux kernel and associated administrativetools that enhances the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Person re-identification across cameras remains a very challenging problem, especially when there are no overlapping fields of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2015
Highly Cited
2015
In this paper we introduce a method for person re-identification based on discriminative, sparse basis expansions of targets in… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Avoiding the use of complicated pre-processing steps such as accurate face and body part segmentation or image normalization… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Owing to visual ambiguities and disparities, person re-identification methods inevitably produce sub optimal rank-list, which… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 10
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In a crowded public space, people often walk in groups, either with people they know or strangers. Associating a group of people… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
  • Wentao Liu
  • International Conference on MultiMedia and…
  • 2008
The architecture of network intrusion detection system based on network protocol analysis on Linux is provided. The design… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
2006
2006
With increasing usage of Linux in various computing environments, a lot of security vulnerabilities are being discovered in GNU… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
1Dipartimento di Elettronica e Telecomunicazioni, Università degli studi di Firenze, Via Santa Marta 3, 50139 Firenze, Italy 2The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Watermarking models a copyright protection mechanism where an original source sequence or “covertext” is modified before… (More)
  • figure 1
  • figure 2
Is this relevant?