Sciweavers

206 search results - page 30 / 42
» Network selection using fuzzy logic
Sort
View
JIPS
2010
195views more  JIPS 2010»
14 years 4 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
HEURISTICS
2002
99views more  HEURISTICS 2002»
14 years 9 months ago
Parallelizing Tabu Search on a Cluster of Heterogeneous Workstations
In this paper, we present the parallelization of tabu search on a network of workstations using PVM. Two parallelization strategies are integrated: functional decomposition strate...
Ahmad A. Al-Yamani, Sadiq M. Sait, Habib Youssef, ...
JAIHC
2010
205views more  JAIHC 2010»
14 years 8 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
IJSNET
2008
118views more  IJSNET 2008»
14 years 9 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...
75
Voted
ICNSC
2007
IEEE
15 years 4 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen