Sciweavers

440 search results - page 80 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
BMCBI
2004
93views more  BMCBI 2004»
14 years 11 months ago
Predicting binding sites of hydrolase-inhibitor complexes by combining several methods
Background: Protein-protein interactions play a critical role in protein function. Completion of many genomes is being followed rapidly by major efforts to identify interacting pr...
Taner Z. Sen, Andrzej Kloczkowski, Robert L. Jerni...
ANCS
2007
ACM
15 years 3 months ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
CCS
2008
ACM
15 years 1 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
BMCBI
2010
167views more  BMCBI 2010»
14 years 11 months ago
Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of met
Background: Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurat...
Melissa J. Morine, Jolene McMonagle, Sinead Toomey...
CSB
2003
IEEE
15 years 4 months ago
A Probabilistic Model for Identifying Protein Names and their Name Boundaries
This paper proposes a method for identifying protein names in biomedical texts with an emphasis on detecting protein name boundaries. We use a probabilistic model which exploits s...
Kazuhiro Seki, Javed Mostafa