Sciweavers

28 search results - page 3 / 6
» Controling The False Positive Detection Rate In Fuzzy Cluste...
Sort
View
CEC
2010
IEEE
13 years 8 months ago
An analysis of clustering objectives for feature selection applied to encrypted traffic identification
This work explores the use of clustering objectives in a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, under the application...
Carlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. ...
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 10 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 6 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
14 years 1 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood
BMCBI
2007
145views more  BMCBI 2007»
13 years 7 months ago
The utility of MAS5 expression summary and detection call algorithms
Background: Used alone, the MAS5.0 algorithm for generating expression summaries has been criticized for high False Positive rates resulting from exaggerated variance at low inten...
Stuart D. Pepper, Emma K. Saunders, Laura E. Edwar...