Sciweavers

93 search results - page 18 / 19
» Data Reduction and Ensemble Classifiers in Intrusion Detecti...
Sort
View
CCS
2009
ACM
14 years 9 days ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
AAMAS
2006
Springer
13 years 5 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
BMCBI
2006
100views more  BMCBI 2006»
13 years 5 months ago
Using the nucleotide substitution rate matrix to detect horizontal gene transfer
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Micah Hamady, M. D. Betterton, Rob Knight
JCIT
2010
156views more  JCIT 2010»
13 years 9 days ago
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection
Artificial Neural Networks(ANNS) have top level of capability to progress the estimation of cracks in metal tubes. The aim of this paper is to propose an algorithm to identify mod...
Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mo...
SKG
2006
IEEE
13 years 11 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han