Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Linux Intrusion Detection System

Known as: LIDS, LinuxIntrusionDetectionSystem 
Incomputer security, the Linux Intrusion Detection System (LIDS) is a patch to the Linux kernel and associated administrativetools that enhances the… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Person re-identification across cameras remains a very challenging problem, especially when there are no overlapping fields of… 
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2016
2016
In recent years, sophisticated image-based reconstruction methods for the human face have been developed. These methods capture… 
  • figure 3
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2014
Highly Cited
2014
Abstract Avoiding the use of complicated pre-processing steps such as accurate face and body part segmentation or image… 
  • figure 1
  • table 1
  • figure 3
  • figure 4
  • table 2
Highly Cited
2010
Highly Cited
2010
In many surveillance systems there is a requirement todetermine whether a given person of interest has alreadybeen observed over… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
In a crowded public space, people often walk in groups, either with people they know or strangers. Associating a group of people… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
We propose a novel technique for head pose classification in crowded public space under poor lighting and in low-resolution video… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2006
2006
With increasing usage of Linux in various computing environments, a lot of security vulnerabilities are being discovered in GNU… 
Highly Cited
2002
Highly Cited
2002
Watermarking models a copyright protection mechanism where an original source sequence or "covertext" is modified before… 
  • figure 1
  • figure 2
Highly Cited
2000
Highly Cited
2000
Energy is a constrained resource in mobile wireless networks. In such networks, communication takes place over fading channels… 
  • figure 1-1
  • figure 2-1
  • figure 3-1
  • figure 3-2
  • figure 4-1
Highly Cited
1995
Highly Cited
1995
We study the problem of statistical multiplexing of cell streams that have correlations at multiple time-scales. Each stream is… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4