Sciweavers

1013 search results - page 133 / 203
» Intrusion detection
Sort
View
PVLDB
2010
172views more  PVLDB 2010»
15 years 3 months ago
Database-support for Continuous Prediction Queries over Streaming Data
Prediction is emerging as an essential ingredient for real-time monitoring, planning and decision support applications such as intrusion detection, e-commerce pricing and automate...
Mert Akdere, Ugur Çetintemel, Eli Upfal
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
15 years 9 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
IEEEIAS
2009
IEEE
16 years 23 hour ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 11 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
134
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 5 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer