Sciweavers

776 search results - page 107 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
IJON
2008
156views more  IJON 2008»
15 years 4 months ago
Structural identifiability of generalized constraint neural network models for nonlinear regression
Identifiability becomes an essential requirement for learning machines when the models contain physically interpretable parameters. This paper presents two approaches to examining...
Shuang-Hong Yang, Bao-Gang Hu, Paul-Henry Courn&eg...

Publication
152views
15 years 7 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
NN
2008
Springer
201views Neural Networks» more  NN 2008»
15 years 4 months ago
Learning representations for object classification using multi-stage optimal component analysis
Learning data representations is a fundamental challenge in modeling neural processes and plays an important role in applications such as object recognition. In multi-stage Optima...
Yiming Wu, Xiuwen Liu, Washington Mio
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
16 years 4 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
HOTI
2008
IEEE
15 years 10 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani