Sciweavers

2414 search results - page 208 / 483
» Computing Normal Subgroups
Sort
View
CCS
2006
ACM
14 years 1 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
ENGL
2007
130views more  ENGL 2007»
13 years 9 months ago
Wavelet Based Classification for Cancer Diagnosis
— We make use of discrete wavelets to extract distinguishing features between normal and cancerous human breast tissue fluorescence spectra. These are then used in conjunction wi...
Bhadra Mani, C. Raghavendra Rao, P. Anantha Lakshm...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
BMCBI
2005
115views more  BMCBI 2005»
13 years 9 months ago
Statistical distributions of optimal global alignment scores of random protein sequences
Background: The inference of homology from statistically significant sequence similarity is a central issue in sequence alignments. So far the statistical distribution function un...
Hongxia Pang, Jiaowei Tang, Su-Shing Chen, Shiheng...
SIAMJO
2010
107views more  SIAMJO 2010»
13 years 7 months ago
Second-Order Analysis of Polyhedral Systems in Finite and Infinite Dimensions with Applications to Robust Stability of Variation
Abstract. This paper concerns second-order analysis for a remarkable class of variational systems in finite-dimensional and infinite-dimensional spaces, which is particularly imp...
René Henrion, Boris S. Mordukhovich, Nguyen...