Sciweavers

188 search results - page 22 / 38
» Anomaly Detection Using the Dempster-Shafer Method
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
13 years 6 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
ICML
2010
IEEE
13 years 8 months ago
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes
Most existing algorithms for clinical risk stratification rely on labeled training data. Collecting this data is challenging for clinical conditions where only a small percentage ...
Zeeshan Syed, Ilan Rubinfeld
IMC
2005
ACM
14 years 1 months ago
Improving Sketch Reconstruction Accuracy Using Linear Least Squares Method
Sketch is a sublinear space data structure that allows one to approximately reconstruct the value associated with any given key in an input data stream. It is the basis for answer...
Gene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang
ICCVG
2010
13 years 5 months ago
A New Method for ECG Signal Feature Extraction
Abstract. The paper concentrates on electrocardiographic (ECG) signal analysis for the sake of acquiring proper heartbeat datasets for further detection and recognition of anomalie...
Adam Szczepanski, Khalid Saeed, Alois Ferscha
CIA
2007
Springer
14 years 1 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...