Sciweavers

8177 search results - page 231 / 1636
» Detecting System Emulators
Sort
View
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 9 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 2 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
SOFTCOMP
2010
15 years 1 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...
ADHOCNETS
2009
Springer
15 years 9 months ago
MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling
Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One o...
Panneer Muthukumaran, Rodolfo de Paz Alberola, Ros...
ACMSE
2009
ACM
15 years 9 months ago
Ginger: implementing a new Lisp family syntax
In this paper we introduce G-expressions, a new syntax based on the S-expression syntax utilized by most Lisp family languages. We have implemented a new homoiconic language, Ging...
James Dean Palmer