Sciweavers

699 search results - page 15 / 140
» Cooperative Intrusion Detection in Wireless Sensor Networks
Sort
View
IDEAL
2010
Springer
14 years 8 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
CORR
2006
Springer
142views Education» more  CORR 2006»
14 years 9 months ago
Order-Optimal Data Aggregation in Wireless Sensor Networks - Part I: Regular Networks
The predominate traffic patterns in a wireless sensor network are many-to-one and one-to-many communication. Hence, the performance of wireless sensor networks is characterized by ...
Richard J. Barton, Rong Zheng
76
Voted
IDEAL
2005
Springer
15 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 4 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...