Sciweavers

772 search results - page 121 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
JMLR
2010
185views more  JMLR 2010»
14 years 6 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 3 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
BMCBI
2006
166views more  BMCBI 2006»
14 years 11 months ago
Extraction of phylogenetic network modules from the metabolic network
Background: In bio-systems, genes, proteins and compounds are related to each other, thus forming complex networks. Although each organism has its individual network, some organis...
Takuji Yamada, Minoru Kanehisa, Susumu Goto
MICCAI
2009
Springer
16 years 10 days ago
Nonparametric Mean Shift Functional Detection in the Functional Space for Task and Resting-state fMRI
In functional Magnetic Resonance Imaging (fMRI) data analysis, normalization of time series is an important and sometimes necessary preprocessing step in many widely used methods. ...
Jian Cheng, Feng Shi, Kun Wang, Ming Song, Jiefeng...
IPPS
1999
IEEE
15 years 4 months ago
Reconfigurable Parallel Sorting and Load Balancing: HeteroSort
HeteroSort load balances and sorts within static or dynamic networks. Upon failure of a node or path, HeteroSort uses a genetic algorithm to minimize the distribution path by optim...
Emmett Davis, Bonnie Holte Bennett, Bill Wren, Lin...