Sciweavers

311 search results - page 44 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
ISBI
2002
IEEE
14 years 8 months ago
Optimal nonlinear estimation of photon coordinates in PET
We consider detection of high-energy photons in PET using thick scintillation crystals. Parallax effect and multiple Compton interactions in this type of crystals significantly re...
Alexander M. Bronstein, Michael M. Bronstein, Mich...
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 10 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
CCS
2009
ACM
14 years 2 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
BMCBI
2007
126views more  BMCBI 2007»
13 years 7 months ago
Using gene expression data and network topology to detect substantial pathways, clusters and switches during oxygen deprivation
Background: Biochemical investigations over the last decades have elucidated an increasingly complete image of the cellular metabolism. To derive a systems view for the regulation...
Gunnar Schramm, Marc Zapatka, Roland Eils, Rainer ...
AINA
2003
IEEE
13 years 11 months ago
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
Michael W. David, Kouichi Sakurai