Sciweavers

58 search results - page 7 / 12
» Adaptive anomaly detection with evolving connectionist syste...
Sort
View
ECMDAFA
2009
Springer
119views Hardware» more  ECMDAFA 2009»
13 years 5 months ago
Managing Model Adaptation by Precise Detection of Metamodel Changes
Technological and business changes influence the evolution of software systems. When this happens, the software artifacts may need to be adapted to the changes. This need is rapidl...
Kelly Garcés, Frédéric Jouaul...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
14 years 1 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
TIFS
2008
142views more  TIFS 2008»
13 years 7 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
ENGL
2007
103views more  ENGL 2007»
13 years 7 months ago
Fault Diagnosis of Manufacturing Processes via Genetic Algorithm Approach
—Instantaneous detection and diagnosis of various faults and break-downs in industrial processes is required to reduce production losses and damage to equipments. A solved knowle...
Stefania Gallova