Sciweavers

102 search results - page 9 / 21
» Performance Analysis of Soft Computing Based Anomaly Detecto...
Sort
View
AINA
2004
IEEE
15 years 1 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
ACCV
1998
Springer
15 years 1 months ago
Comparison of Mean Field Annealing and Multiresolution Analysis in Missing Data Estimation
The project we are working on is to help develop and test a low cost, large area, high resolution X-ray detection system with a high dynamic range. The large area is achieved by b...
Hairong Qi, Wesley E. Snyder, Griff L. Bilbro
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 3 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
ANCS
2007
ACM
15 years 1 months ago
High-speed detection of unsolicited bulk emails
We propose a Progressive Email Classifier (PEC) for highspeed classification of message patterns that are commonly associated with unsolicited bulk email (UNBE). PEC is designed t...
Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn Liu, Mich...
TEC
2002
89views more  TEC 2002»
14 years 9 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta