Sciweavers

123 search results - page 4 / 25
» A network intrusion detection method using independent compo...
Sort
View
ICANN
2009
Springer
14 years 2 months ago
Modelling Image Complexity by Independent Component Analysis, with Application to Content-Based Image Retrieval
Abstract. Estimating the degree of similarity between images is a challenging task as the similarity always depends on the context. Because of this context dependency, it seems qui...
Jukka Perkiö, Aapo Hyvärinen
IWANN
2005
Springer
14 years 29 days ago
Robust Blind Image Watermarking with Independent Component Analysis: A Embedding Algorithm
Abstract. The authors propose a new solution to the blind robust watermarking of digital images. In this approach we embed the watermark into the independent components of the imag...
Juan José Murillo-Fuentes, Rafael Boloix-To...
ICANN
2003
Springer
14 years 20 days ago
Dimension Reduction Based on Orthogonality - A Decorrelation Method in ICA
In independent component analysis problems, when we use a one-unit objective function to iteratively estimate several independent components, the uncorrelatedness between the indep...
Kun Zhang, Lai-Wan Chan
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 25 days ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton