Sciweavers

23 search results - page 2 / 5
» A Comparison of Feature-Selection Methods for Intrusion Dete...
Sort
View
ICPR
2008
IEEE
13 years 11 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 6 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
ACSAC
2001
IEEE
13 years 9 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
TMI
2010
172views more  TMI 2010»
13 years 3 months ago
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation
Abstract— We compared four automated methods for hippocampal segmentation using different machine learning algorithms (1) hierarchical AdaBoost, (2) Support Vector Machines (SVM)...
Jonathan H. Morra, Zhuowen Tu, Liana G. Apostolova...
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
13 years 9 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...