Sciweavers

677 search results - page 62 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
SASN
2003
ACM
14 years 1 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
PST
2008
13 years 9 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
JFP
2007
103views more  JFP 2007»
13 years 7 months ago
Warnings for pattern matching
We examine the ML pattern-matching anomalies of useless clauses and non-exhaustive matches. We state the definition of these anomalies, building upon pattern matching semantics, ...
Luc Maranget
AIPR
2008
IEEE
13 years 9 months ago
Detection of ephemeral changes in sequences of images
The formalism of anomalous change detection, which was developed for finding unusual changes in pairs of images, is extended to sequences of more than two images. Extended algorith...
James Theiler, Steven M. Adler-Golden
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 8 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook