Sciweavers

7504 search results - page 293 / 1501
» Computing with Action Potentials
Sort
View
142
Voted
IAT
2007
IEEE
15 years 9 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
126
Voted
CEEMAS
2007
Springer
15 years 8 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
105
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
134
Voted
GIL
2008
15 years 4 months ago
Adoption of Supply Chain Management in German Agrifood Networks
: Supply chain management has emerged as cross functional, cross company concept to improve coordination of entire value chains through coordinated actions of all companies. It has...
Melanie Fritz, Eva Schneemann, Gerhard Schiefer
86
Voted
BIOSYSTEMS
2007
64views more  BIOSYSTEMS 2007»
15 years 2 months ago
Modelling the early steps of transduction in insect olfactory receptor neurons
Olfactory transduction is a multistep process whose basic function is to convert a low energy reaction, the odorant-receptor interaction that may involve a single odorant molecule...
Jean-Pierre Rospars, Philippe Lucas, Mathieu Coppe...