Sciweavers

251 search results - page 2 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
VTC
2006
IEEE
179views Communications» more  VTC 2006»
13 years 11 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
IEAAIE
2004
Springer
13 years 10 months ago
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach
This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
ANNPR
2006
Springer
13 years 9 months ago
Fast Training of Linear Programming Support Vector Machines Using Decomposition Techniques
Abstract. Decomposition techniques are used to speed up training support vector machines but for linear programming support vector machines (LP-SVMs) direct implementation of decom...
Yusuke Torii, Shigeo Abe
IJNSEC
2008
210views more  IJNSEC 2008»
13 years 5 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
PKDD
2009
Springer
113views Data Mining» more  PKDD 2009»
14 years 7 hour ago
Feature Selection for Density Level-Sets
A frequent problem in density level-set estimation is the choice of the right features that give rise to compact and concise representations of the observed data. We present an eï¬...
Marius Kloft, Shinichi Nakajima, Ulf Brefeld