Sciweavers

33 search results - page 5 / 7
» Evolutionary Design of Intrusion Detection Programs
Sort
View
CEC
2011
IEEE
12 years 5 months ago
Inferring transcriptional regulators for sets of co-expressed genes by multi-objective evolutionary optimization
Abstract—Higher organisms are able to respond to continuously changing external conditions by transducing cellular signals into specific regulatory programs, which control gene ...
Adrian Schröder, Clemens Wrzodek, Johannes Wo...
EC
2008
174views ECommerce» more  EC 2008»
13 years 4 months ago
Automated Design of Image Operators that Detect Interest Points
This work describes how evolutionary computation can be used to synthesize lowlevel image operators that detect interesting points on digital images. Interest point detection is a...
Leonardo Trujillo, Gustavo Olague
CCS
2004
ACM
13 years 10 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
13 years 11 months ago
An adaptable FPGA-based System for Regular Expression Matching
In many applications string pattern matching is one of the most intensive tasks in terms of computation time and memory accesses. Network Intrusion Detection Systems and DNA Seque...
Ivano Bonesana, Marco Paolieri, Marco D. Santambro...
WSC
1998
13 years 6 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...