Sciweavers

311 search results - page 42 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
IJNSEC
2007
154views more  IJNSEC 2007»
14 years 9 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
COMCOM
2004
149views more  COMCOM 2004»
14 years 9 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin
PKDD
2009
Springer
113views Data Mining» more  PKDD 2009»
15 years 4 months ago
Feature Selection for Density Level-Sets
A frequent problem in density level-set estimation is the choice of the right features that give rise to compact and concise representations of the observed data. We present an eï¬...
Marius Kloft, Shinichi Nakajima, Ulf Brefeld
AAAI
2012
13 years 2 days ago
A Spin-Glass Model for Semi-Supervised Community Detection
Current modularity-based community detection methods show decreased performance as relational networks become increasingly noisy. These methods also yield a large number of divers...
Eric Eaton, Rachael Mansbach
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
15 years 10 months ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...