Sciweavers

531 search results - page 39 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
CRV
2009
IEEE
206views Robotics» more  CRV 2009»
15 years 8 months ago
Unsupervised Learning of Terrain Appearance for Automated Coral Reef Exploration
We describe a navigation and coverage system based on unsupervised learning driven by visual input. Our objective is to allow a robot to remain continuously moving above a terrain...
Philippe Giguère, Gregory Dudek, Chris Prah...
WETICE
2007
IEEE
15 years 7 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
IDEAL
2005
Springer
15 years 7 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 1 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ACSW
2006
15 years 2 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark