Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Ofer Biller"'
Publikováno v:
PeerJ Computer Science, Vol 2, p e39 (2016)
Common tasks in document analysis, such as binarization, line extraction etc., are still considered difficult for highly degraded text documents. Having reliable fundamental information regarding the characters of the document, such as the distributi
Externí odkaz:
https://doaj.org/article/76cfc430efe2460bb674432a3fe8ea32
Publikováno v:
AAAI
Scopus-Elsevier
Scopus-Elsevier
We propose a hybrid approach to temporal anomaly detection in access data of users to databases --- or more generally, any kind of subject-object co-occurrence data. We consider a high-dimensional setting that also requires fast computation at test t
Publikováno v:
Advances in Knowledge Discovery and Data Mining ISBN: 9783030474355
PAKDD (2)
PAKDD (2)
Database activity monitoring systems aim to protect organizational data by logging users’ activity to Identify and document malicious activity. High-velocity streams and operating costs, restrict these systems to examining only a sample of the acti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf51eab4e54705f195eec7edc6b97693
https://doi.org/10.1007/978-3-030-47436-2_53
https://doi.org/10.1007/978-3-030-47436-2_53
Publikováno v:
Human-Computer Interaction – INTERACT 2019 ISBN: 9783030293802
INTERACT (1)
INTERACT (1)
Visualization tools are critical components of cyber security systems allowing analyzers to better understand, detect and prevent security breaches. Security administrators need to understand which users accessed the database and what operations were
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b40f473ab4e23c93c0f31ac5dd088ec
https://doi.org/10.1007/978-3-030-29381-9_31
https://doi.org/10.1007/978-3-030-29381-9_31
Publikováno v:
Policy-Based Autonomic Data Governance ISBN: 9783030172763
PADG@ESORICS
PADG@ESORICS
Monitoring database activity is useful for identifying and preventing data breaches. Such database activity monitoring (DAM) systems use anomaly detection algorithms to alert security officers to possible infractions. However, the sheer number of tra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f35839370031178135df86b3a28bf268
https://doi.org/10.1007/978-3-030-17277-0_5
https://doi.org/10.1007/978-3-030-17277-0_5
Autor:
Werner Pantke, Volker Märgner, Daniel Fecker, Tim Fingscheidt, Abedelkadir Asi, Ofer Biller, Jihad El-Sana, Raid Saabni, Mohammad Yehia
Publikováno v:
Archiving Conference. 10:161-166
Publikováno v:
CIKM
Security systems for databases produce numerous alerts about anomalous activities and policy rule violations. Prioritizing these alerts will help security personnel focus their efforts on the most urgent alerts. Currently, this is done manually by se
Publikováno v:
Document Analysis Systems
This research studies the effect of language orthographic characteristics on the performance of digital word recognition in degraded documents such as historical documents. We provide a rigorous scheme for quantifying the statistical influence of the
Publikováno v:
ICDAR
We present WebGT, the first web-based system to help users produce ground truth data for document images. This user-friendly software system helps historians and computer scientists collectively annotate historical documents. It supports real time co
Publikováno v:
ICDAR
Most of the algorithms proposed for text line detection are designed to process binary images as input. For severely degraded documents, binarization often introduces significant noise and other artifacts. In this work we present a novel method desig