Sciweavers

123 search results - page 19 / 25
» A network intrusion detection method using independent compo...
Sort
View
NN
2008
Springer
150views Neural Networks» more  NN 2008»
13 years 8 months ago
Neural network based pattern matching and spike detection tools and services - in the CARMEN neuroinformatics project
In the study of information flow in the nervous system, component processes can be investigated using a range of electrophysiological and imaging techniques. Although data is diff...
Martyn Fletcher, Bojian Liang, Leslie Smith, Alast...
IISWC
2009
IEEE
14 years 3 months ago
Experimental evaluation of N-tier systems: Observation and analysis of multi-bottlenecks
In many areas such as e-commerce, mission-critical N-tier applications have grown increasingly complex. They are characterized by non-stationary workloads (e.g., peak load several...
Simon Malkowski, Markus Hedwig, Calton Pu
RAID
2010
Springer
13 years 7 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
IS
2010
13 years 7 months ago
ROC analysis of a fatigue classifier for vehicular drivers
— Few systems have been developed for the detection of fatigue / stress level of a vehicular driver in order to monitor and control the alertness level for preventing road accide...
Mahesh M. Bundele, Rahul Banerjee
ITIIS
2010
172views more  ITIIS 2010»
13 years 7 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li