6 resultados para Voiced or unvoiced classification
em Bulgarian Digital Mathematics Library at IMI-BAS
Resumo:
* This study was supported in part by the Natural Sciences and Engineering Research Council of Canada, and by the Gastrointestinal Motility Laboratory (University of Alberta Hospitals) in Edmonton, Alberta, Canada.
Resumo:
Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis for distinguishing the intrusive activity from the legal one using string metric algorithms. The major results of the implemented simulation experiments are presented and discussed as well.
Resumo:
2000 Mathematics Subject Classification: 54H05, 03E15, 46B26
Resumo:
2010 Mathematics Subject Classification: 53A07, 53A35, 53A10.
Resumo:
ACM Computing Classification System (1998): H.2.8, H.3.3.
Resumo:
2000 Mathematics Subject Classification: 62P10, 62H30