Sciweavers

420 search results - page 41 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 1 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
IPPS
2006
IEEE
15 years 5 months ago
A nonself space approach to network anomaly detection
The paper presents an approach for the anomaly detection problem based on principles of immune systems. Flexibility and efficiency of the anomaly detection system are achieved by ...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
PVLDB
2010
172views more  PVLDB 2010»
14 years 10 months ago
Database-support for Continuous Prediction Queries over Streaming Data
Prediction is emerging as an essential ingredient for real-time monitoring, planning and decision support applications such as intrusion detection, e-commerce pricing and automate...
Mert Akdere, Ugur Çetintemel, Eli Upfal
IJCNN
2008
IEEE
15 years 6 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn
KES
2006
Springer
14 years 11 months ago
Evolutionary Tuning of Combined Multiple Models
Abstract. In data mining, hybrid intelligent systems present a synergistic combination of multiple approaches to develop the next generation of intelligent systems. Our paper prese...
Gregor Stiglic, Peter Kokol