Sciweavers

776 search results - page 24 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ICDCN
2011
Springer
14 years 7 months ago
Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time
This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surve...
Congduc Pham
140
Voted
TEC
2002
166views more  TEC 2002»
15 years 3 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
98
Voted
ML
2006
ACM
15 years 3 months ago
Application of abductive ILP to learning metabolic network inhibition from temporal data
Alireza Tamaddoni-Nezhad, Raphael Chaleil, Antonis...
ADHOCNETS
2009
Springer
15 years 10 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
117
Voted
CCS
2009
ACM
16 years 4 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...