Sciweavers

420 search results - page 56 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 12 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
ISRR
2005
Springer
178views Robotics» more  ISRR 2005»
15 years 5 months ago
Improved Estimation of Target Velocity Using Multiple Model Estimation and a Dynamic Bayesian Network for a Robotic Tracker of O
A vision-based automatic tracking system for ocean animals in the midwater has been demonstrated in Monterey Bay, CA. Currently, the input to this system is a measurement of relati...
Aaron Plotnik, Stephen Rock
ACL
2011
14 years 3 months ago
Learning Sub-Word Units for Open Vocabulary Speech Recognition
Large vocabulary speech recognition systems fail to recognize words beyond their vocabulary, many of which are information rich terms, like named entities or foreign words. Hybrid...
Carolina Parada, Mark Dredze, Abhinav Sethy, Ariya...
WWW
2005
ACM
16 years 15 days ago
Hybrid semantic tagging for information extraction
The semantic web is expected to have an impact at least as big as that of the existing HTML based web, if not greater. However, the challenge lays in creating this semantic web an...
Ronen Feldman, Binyamin Rosenfeld, Moshe Fresko, B...
ETRICS
2006
15 years 3 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...