Sciweavers

765 search results - page 125 / 153
» Detecting Anomalies and Intruders
Sort
View
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 10 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
JIIS
1998
97views more  JIIS 1998»
13 years 9 months ago
Knowledge Mining With VxInsight: Discovery Through Interaction
The explosive growth in the availability of information is overwhelming traditional information management systems. Although individual pieces of information have become easy to ï¬...
George S. Davidson, Bruce Hendrickson, David K. Jo...
ICCVG
2010
13 years 7 months ago
A New Method for ECG Signal Feature Extraction
Abstract. The paper concentrates on electrocardiographic (ECG) signal analysis for the sake of acquiring proper heartbeat datasets for further detection and recognition of anomalie...
Adam Szczepanski, Khalid Saeed, Alois Ferscha
TSP
2010
13 years 4 months ago
On local intrinsic dimension estimation and its applications
In this paper, we present multiple novel applications for local intrinsic dimension estimation. There has been much work done on estimating the global dimension of a data set, typi...
Kevin M. Carter, Raviv Raich, Alfred O. Hero
DIMVA
2008
13 years 11 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...