Sciweavers

772 search results - page 82 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 5 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
ACSAC
2009
IEEE
15 years 3 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ICON
2007
IEEE
15 years 6 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
CDC
2008
IEEE
147views Control Systems» more  CDC 2008»
15 years 6 months ago
Clustering neural spike trains with transient responses
— The detection of transient responses, i.e. non– stationarities, that arise in a varying and small fraction of the total number of neural spike trains recorded from chronicall...
John D. Hunter, Jianhong Wu, John G. Milton
IJCNN
2000
IEEE
15 years 4 months ago
Evolving Neural Network Structures Using Axonal Growth Mechanisms
In the eld of arti cial evolution creating methods to evolve neural networks is an important goal. But how to encode the structure and properties of the neural network in the geno...
Peter Eggenberger