Sciweavers

3785 search results - page 142 / 757
» Immune System Based Intrusion Detection System
Sort
View
CORR
2010
Springer
160views Education» more  CORR 2010»
15 years 4 months ago
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). U...
Feng Gu, Julie Greensmith, Robert Oates, Uwe Aicke...
CGO
2005
IEEE
15 years 10 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ICAT
2003
IEEE
15 years 10 months ago
The study of remote saccade sensing system based on retroreflective feature of the retina
We present a new method for detecting rapid eye movements called a saccade without constraining the head, based on the fast, robust pupil detection technique [1][2]. The technique...
Junji Watanabe, Hideyuki Ando, Dairoku Sekiguchi, ...
IJAIT
2007
180views more  IJAIT 2007»
15 years 4 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
DSN
2007
IEEE
15 years 11 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang