Sciweavers

288 search results - page 24 / 58
» Performance anomaly of 802.11b
Sort
View
89
Voted
ICARIS
2009
Springer
15 years 4 months ago
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
As one of the newest members in Artificial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to th...
Feng Gu, Julie Greensmith, Uwe Aickelin
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
15 years 4 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
86
Voted
CIKM
2007
Springer
15 years 3 months ago
Detecting distance-based outliers in streams of data
In this work a method for detecting distance-based outliers in data streams is presented. We deal with the sliding window model, where outlier queries are performed in order to de...
Fabrizio Angiulli, Fabio Fassetti
IAT
2007
IEEE
15 years 4 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
102
Voted
ATAL
2008
Springer
14 years 11 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...