Sciweavers

8177 search results - page 492 / 1636
» Detecting System Emulators
Sort
View
LCN
2006
IEEE
15 years 10 months ago
Enhanced Network-State Estimation using Change Detection
This paper presents the concept of change detection for filter-based network-state estimation. This could be useful in various contexts; two examples are network management and ad...
Erik Hartikainen, Svante Ekelin
ICARIS
2005
Springer
15 years 10 months ago
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed t...
Thomas Stibor, Jonathan Timmis, Claudia Eckert
ISNN
2005
Springer
15 years 10 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
VLDB
2005
ACM
125views Database» more  VLDB 2005»
15 years 10 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
IWIA
2003
IEEE
15 years 10 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...