Sciweavers

2236 search results - page 75 / 448
» Intrusion detection techniques and approaches
Sort
View
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
IJON
2006
146views more  IJON 2006»
14 years 10 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
MICCAI
2002
Springer
15 years 10 months ago
Improved Detection Sensitivity in Functional MRI Data Using a Brain Parcelling Technique
We present a comparison between a voxel based approach and a region based technique for detecting brain activation signals in sequences of functional Magnetic Resonance Images (fMR...
Guillaume Flandin, Ferath Kherif, Xavier Pennec, G...
ANSS
2006
IEEE
15 years 4 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
91
Voted
SIS
2008
14 years 11 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...