Browsing by Subject "Intrusion"
Now showing items 1-2 of 2
-
Efficient and effective automated surveillance agents using kernel tricks
(© 2012 The Society for Modeling and Simulation International., 2012)Many schemes have been presented over the years to develop automated visual surveillance systems. However, these schemes typically need custom equipment, or involve significant complexity and storage requirements. In this ... -
Visualization of security vulnerabilities through intrusion detection system
(BRAC University, 2007-09)Security in computer and computer network is of great importance now-a-days. Identifying attacks and taking appropriate measure by system administrator is of special concern. This paper is a study and proposal of an ...