Background: In the analysis of microarray data one generally produces a vector of p-values that for each gene give the likelihood of obtaining equally strong evidence of change by...
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
This paper presents a genetic programming based detection system for Data Link layer attacks on a WiFi network. We explore the use of two different fitness functions in order to ...
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Object detection can be posted as those classification tasks where the rare positive patterns are to be distinguished from the enormous negative patterns. To avoid the danger of m...