Sciweavers

8177 search results - page 231 / 1636
» Detecting System Emulators
Sort
View
107
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 7 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 27 days ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
193
Voted
SOFTCOMP
2010
14 years 11 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...
118
Voted
ADHOCNETS
2009
Springer
15 years 7 months ago
MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling
Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One o...
Panneer Muthukumaran, Rodolfo de Paz Alberola, Ros...
118
Voted
ACMSE
2009
ACM
15 years 7 months ago
Ginger: implementing a new Lisp family syntax
In this paper we introduce G-expressions, a new syntax based on the S-expression syntax utilized by most Lisp family languages. We have implemented a new homoiconic language, Ging...
James Dean Palmer