Sciweavers

165 search results - page 6 / 33
» Soft computing in intrusion detection: the state of the art
Sort
View
ADHOCNETS
2009
Springer
15 years 4 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
CORR
2006
Springer
152views Education» more  CORR 2006»
14 years 9 months ago
On Reduced Complexity Soft-Output MIMO ML detection
In multiple-input multiple-output (MIMO) fading channels maximum likelihood (ML) detection is desirable to achieve high performance, but its complexity grows exponentially with th...
Massimiliano Siti, Michael P. Fitz
IPPS
1998
IEEE
15 years 1 months ago
Design of a FEM Computation Engine for Real-Time Laparoscopic Surgery Simulation
We present the design of a computation engine for a real-time laparoscopic surgery simulator. Since this simulator requires realistic real-time and real-world behaviour, a physica...
Alex Rhomberg, Rolf Enzler, Markus Thaler, Gerhard...
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
96
Voted
NDSS
2003
IEEE
15 years 2 months ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum