Sciweavers

2236 search results - page 73 / 448
» Intrusion detection techniques and approaches
Sort
View
LREC
2008
78views Education» more  LREC 2008»
14 years 11 months ago
Comparing Corpus-based to Web-based Lookup Techniques for Automatic English Inclusion Detection
The influence of English as a global language continues to grow to an extent that its words and expressions permeate the original forms of other languages. This paper evaluates a ...
Beatrice Alex
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
15 years 1 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
CLOR
2006
15 years 1 months ago
Comparison of Generative and Discriminative Techniques for Object Detection and Classification
Many approaches to object recognition are founded on probability theory, and can be broadly characterized as either generative or discriminative according to whether or not the dis...
Ilkay Ulusoy, Christopher M. Bishop
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 4 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
15 years 4 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...