Sciweavers

88 search results - page 15 / 18
» Trust-Based Classifier Combination for Network Anomaly Detec...
Sort
View
GPEM
2010
134views more  GPEM 2010»
14 years 8 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
ROBOCUP
2004
Springer
95views Robotics» more  ROBOCUP 2004»
15 years 2 months ago
Visual Robot Detection in RoboCup Using Neural Networks
Abstract. Robot recognition is a very important point for further improvements in game-play in RoboCup middle size league. In this paper we present a neural recognition method we d...
Ulrich Kaufmann, Gerd Mayer, Gerhard K. Kraetzschm...
CSFW
2009
IEEE
15 years 4 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
ICNS
2007
IEEE
15 years 3 months ago
Point-to-Point Services in Hybrid Networks: Technologies and Performance Metrics
Research networks, apart from pure IP packet-switched services, progressively introduce hybrid services, which combine packet switching and circuit switching technologies. Optical...
Athanassios Liakopoulos, Andreas Hanemann, Afrodit...
CN
2004
256views more  CN 2004»
14 years 9 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...