Sciweavers

405 search results - page 12 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
IMC
2009
ACM
14 years 3 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ADHOCNETS
2009
Springer
14 years 3 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
14 years 1 months ago
MILA - Multilevel Immune Learning Algorithm
The biological immune system is an intricate network of specialized tissues, organs, cells, and chemical molecules. T-cell-dependent humoral immune response is one of the complex i...
Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumd...
ICIP
2009
IEEE
14 years 9 months ago
Face Recognition With Salient Local Gradient Orientation Binary Patterns
This paper proposes a new face recognition method. There are two novelties in the proposed method. First, a new saliency measure function is designed to detect the most salient re...
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 2 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park