Sciweavers

336 search results - page 42 / 68
» Immune System Approaches to Intrusion Detection - A Review
Sort
View
BMCBI
2006
126views more  BMCBI 2006»
14 years 12 months ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
15 years 5 months ago
Applying both positive and negative selection to supervised learning for anomaly detection
This paper presents a novel approach of applying both positive selection and negative selection to supervised learning for anomaly detection. It first learns the patterns of the n...
Xiaoshu Hang, Honghua Dai
ACSAC
2008
IEEE
15 years 6 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 5 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 12 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan