Sciweavers

420 search results - page 48 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
ANSS
2006
IEEE
15 years 5 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
AIIA
2009
Springer
15 years 6 months ago
Analyzing Interactive QA Dialogues Using Logistic Regression Models
With traditional Question Answering (QA) systems having reached nearly satisfactory performance, an emerging challenge is the development of successful Interactive Question Answeri...
Manuel Kirschner, Raffaella Bernardi, Marco Baroni...
AGI
2011
14 years 3 months ago
Imprecise Probability as a Linking Mechanism between Deep Learning, Symbolic Cognition and Local Feature Detection in Vision Pro
A novel approach to computer vision is outlined, involving the use of imprecise probabilities to connect a deep learning based hierarchical vision system with both local feature de...
Ben Goertzel
ACSAC
2005
IEEE
15 years 5 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 3 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...