Sciweavers

42 search results - page 4 / 9
» The Deterministic Dendritic Cell Algorithm
Sort
View
96
Voted
CEC
2008
IEEE
15 years 6 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
15 years 24 days ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
SAC
2009
ACM
15 years 6 months ago
Celling SHIM: compiling deterministic concurrency to a heterogeneous multicore
Parallel architectures are the way of the future, but are notoriously difficult to program. In addition to the low-level constructs they often present (e.g., locks, DMA, and non-...
Nalini Vasudevan, Stephen A. Edwards
APIN
2010
172views more  APIN 2010»
14 years 12 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...