Sciweavers

8177 search results - page 407 / 1636
» Detecting System Emulators
Sort
View
DELTA
2002
IEEE
15 years 9 months ago
Multi-User Detection for CDMA Communications Based on Self Organized Neural Networks Structures
In the upcoming high transmission rate system, based on code division multiple access, standard multi-user detection methods are restricted because of performance and implementati...
Florent Carlier, Fabienne Nouvel, Jacques Citerne
135
Voted
VIP
2003
15 years 5 months ago
Edge Detection Based on Modified BP Algorithm of ANN
1 Accurately locating edge points is important for image measurement. This paper describes an edge detection method based on back-propagation algorithm of neural networks. A three-...
Lihong Zheng, Xiangjian He
131
Voted
CORR
2010
Springer
150views Education» more  CORR 2010»
15 years 4 months ago
Dendritic Cells for Real-Time Anomaly Detection
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the ystem. The behaviour of human DCs is abstracted to form an algorithm suitable...
Julie Greensmith, Uwe Aickelin
149
Voted
JCS
2002
100views more  JCS 2002»
15 years 3 months ago
STATL: An Attack Language for State-Based Intrusion Detection
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
Steve T. Eckmann, Giovanni Vigna, Richard A. Kemme...
IMC
2004
ACM
15 years 9 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese