Sciweavers

93 search results - page 6 / 19
» Data Reduction and Ensemble Classifiers in Intrusion Detecti...
Sort
View
ICPR
2008
IEEE
14 years 1 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
IWIA
2005
IEEE
14 years 9 days ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
ICARIS
2007
Springer
14 years 26 days ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
TSMC
2008
172views more  TSMC 2008»
13 years 6 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
SIGMOD
2006
ACM
131views Database» more  SIGMOD 2006»
14 years 6 months ago
An automatic construction and organization strategy for ensemble learning on data streams
As data streams are gaining prominence in a growing number of emerging application domains, classification on data streams is becoming an active research area. Currently, the typi...
Yi Zhang, Xiaoming Jin