A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
Abstract. Robot recognition is a very important point for further improvements in game-play in RoboCup middle size league. In this paper we present a neural recognition method we d...
Ulrich Kaufmann, Gerd Mayer, Gerhard K. Kraetzschm...
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
Research networks, apart from pure IP packet-switched services, progressively introduce hybrid services, which combine packet switching and circuit switching technologies. Optical...
Athanassios Liakopoulos, Andreas Hanemann, Afrodit...
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...