Sciweavers

405 search results - page 12 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ADHOCNETS
2009
Springer
15 years 4 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
15 years 2 months ago
MILA - Multilevel Immune Learning Algorithm
The biological immune system is an intricate network of specialized tissues, organs, cells, and chemical molecules. T-cell-dependent humoral immune response is one of the complex i...
Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumd...
84
Voted
ICIP
2009
IEEE
15 years 10 months ago
Face Recognition With Salient Local Gradient Orientation Binary Patterns
This paper proposes a new face recognition method. There are two novelties in the proposed method. First, a new saliency measure function is designed to detect the most salient re...
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 2 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park