Sciweavers

13 search results - page 2 / 3
» An evolutionary algorithm to generate ellipsoid network intr...
Sort
View
CRITIS
2007
13 years 8 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
SBRN
2006
IEEE
14 years 21 days ago
Evolutionary Algorithm for 3D Object Reconstruction from Images
This work presents an evolutionary algorithm to reconstruct 3D objects based on images of them. In the proposed evolutionary algorithm, we describe a way to evolve 3D initial mode...
Renata L. M. E. do Rego, Hansenclever de F. Bassan...
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
13 years 10 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 1 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
ACSAC
2007
IEEE
14 years 1 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...