Sciweavers

721 search results - page 69 / 145
» Biological Network Inference Using Redundancy Analysis
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels
CEAS
2004
Springer
15 years 3 months ago
Reputation Network Analysis for Email Filtering
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
Jennifer Golbeck, James A. Hendler
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 4 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a ...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
BCB
2010
175views Bioinformatics» more  BCB 2010»
14 years 4 months ago
Gene set analysis using principal components
We present a new method for identifying gene sets associated with labeled samples, where the labels can be case versus control, or genotype differences. Existing approaches to thi...
Isa Kemal Pakatci, Wei Wang, Leonard McMillan