Sciweavers

6455 search results - page 927 / 1291
» Research problems
Sort
View
118
Voted
BROADNETS
2007
IEEE
15 years 11 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
CEC
2007
IEEE
15 years 11 months ago
Towards a quantitative notion of self-organisation
— Organic Computing (OC) and other research initiatives like Autonomic Computing or Proactive Computing have developed the idea of systems that possess life-like properties, that...
Emre Cakar, Moez Mnif, Christian Müller-Schlo...
CEC
2007
IEEE
15 years 11 months ago
Constrained genetic algorithm based independent component analysis
Independent Component Analysis, a computationally efficient statistical signal processing technique, has been an area of interest for researchers for many practical applications in...
D. P. Acharya, Ganapati Panda, Y. V. S. Lakshmi
125
Voted
CNSR
2007
IEEE
15 years 11 months ago
Testing Intrusion Detection Systems in MANET: A Comprehensive Study
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
GRC
2007
IEEE
15 years 11 months ago
MGRS in Incomplete Information Systems
The original rough set model is concerned primarily with the approximation of sets described by single binary relation on the universe. In the view of granular computing, classica...
Yuhua Qian, Jiye Liang, Chuangyin Dang