Sciweavers

46 search results - page 7 / 10
» Data fusion algorithms for network anomaly detection: classi...
Sort
View
RAID
2005
Springer
14 years 5 days ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
AHSWN
2006
206views more  AHSWN 2006»
13 years 6 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
AINA
2004
IEEE
13 years 10 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
ISCIS
2005
Springer
14 years 6 days ago
Classification of Volatile Organic Compounds with Incremental SVMs and RBF Networks
Support Vector Machines (SVMs) have been applied to solve the classification of volatile organic compounds (VOC) data in some recent studies. SVMs provide good generalization perfo...
Zeki Erdem, Robi Polikar, Nejat Yumusak, Fikret S....
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 7 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...