Sciweavers

776 search results - page 29 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
HAIS
2008
Springer
15 years 3 months ago
Classification Agent-Based Techniques for Detecting Intrusions in Databases
This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reaso...
Cristian Pinzón, Yanira de Paz, Rosa Cano
TIFS
2008
154views more  TIFS 2008»
15 years 1 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
ICASSP
2011
IEEE
14 years 5 months ago
Improving kernel-energy trade-offs for machine learning in implantable and wearable biomedical applications
Emerging biomedical sensors and stimulators offer unprecedented modalities for delivering therapy and acquiring physiological signals (e.g., deep brain stimulators). Exploiting th...
Kyong-Ho Lee, Sun-Yuan Kung, Naveen Verma
ISI
2008
Springer
15 years 1 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
JSAC
2006
93views more  JSAC 2006»
15 years 1 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....