Sciweavers

10 search results - page 2 / 2
» Learning Problem and BCJR Decoding Algorithm in Anomaly-base...
Sort
View
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
13 years 11 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
CCS
2007
ACM
13 years 11 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CCS
2006
ACM
13 years 9 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
IJON
2006
146views more  IJON 2006»
13 years 5 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
MLMI
2007
Springer
13 years 11 months ago
Modeling Vocal Interaction for Segmentation in Meeting Recognition
Automatic segmentation is an important technology for both automatic speech recognition and automatic speech understanding. In meetings, participants typically vocalize for only a ...
Kornel Laskowski, Tanja Schultz