Sciweavers

3785 search results - page 141 / 757
» Immune System Based Intrusion Detection System
Sort
View
DATE
2006
IEEE
140views Hardware» more  DATE 2006»
15 years 10 months ago
Optimization of regular expression pattern matching circuits on FPGA
Regular expressions are widely used in Network Intrusion Detection System (NIDS) to represent patterns of network attacks. Since traditional software-only NIDS cannot catch up to ...
Cheng-Hung Lin, Chih-Tsun Huang, Chang-Ping Jiang,...
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 10 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 4 months ago
Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
CORR
2010
Springer
126views Education» more  CORR 2010»
15 years 4 months ago
The Use of Probabilistic Systems to Mimic the Behaviour of Idiotypic AIS Robot Controllers
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
PDP
2009
IEEE
15 years 11 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...