Sciweavers

88 search results - page 10 / 18
» Trust-Based Classifier Combination for Network Anomaly Detec...
Sort
View
TIFS
2008
142views more  TIFS 2008»
14 years 9 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
CORR
2008
Springer
159views Education» more  CORR 2008»
14 years 9 months ago
Face Detection Using Adaboosted SVM-Based Component Classifier
: Boosting is a general method for improving the accuracy of any given learning algorithm. In this paper we employ combination of Adaboost with Support Vector Machine (SVM) as comp...
Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan,...
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 4 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
IAT
2007
IEEE
15 years 3 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 3 months ago
Real Time Detection of Link Failures in Inter Domain Routing
Abstract— Measurements have shown that network path failures occur frequently in the Internet and physical link failures can cause network instability in large scale and severity...
Xiaobo Long, Biplab Sikdar