Sciweavers

412 search results - page 31 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
TSMC
2010
13 years 2 months ago
On Robust Stability of Stochastic Genetic Regulatory Networks With Time Delays: A Delay Fractioning Approach
Robust stability serves as an important regulation mechanism in system biology and synthetic biology. In this paper, the robust stability analysis problem is investigated for a cla...
Yao Wang, Zidong Wang, Jinling Liang
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
14 years 8 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han
ETRICS
2006
13 years 11 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FORTE
1997
13 years 9 months ago
On-Line Timed Protocol Trace Analysis Based on Uncertain State Descriptions
This paper presents a new approach to the task of passive protocol tracing. The method called FollowSM for the first time meets all requirements of practical in-field use, inclu...
Marek Musial
ECML
2007
Springer
14 years 1 months ago
Dual Strategy Active Learning
Abstract. Active Learning methods rely on static strategies for sampling unlabeled point(s). These strategies range from uncertainty sampling and density estimation to multi-factor...
Pinar Donmez, Jaime G. Carbonell, Paul N. Bennett