Sciweavers

157 search results - page 20 / 32
» Immune Network based Ensembles
Sort
View
SACRYPT
2005
Springer
14 years 6 days ago
Proving the Security of AES Substitution-Permutation Network
In this paper we study the substitution-permutation network (SPN) on which AES is based. We introduce AES∗ , a SPN identical to AES except that fixed S-boxes are replaced by ran...
Thomas Baignères, Serge Vaudenay
TEC
2002
89views more  TEC 2002»
13 years 6 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
CCS
2008
ACM
13 years 8 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
APWEB
2009
Springer
13 years 4 months ago
Core-Tag Clustering for Web 2.0 Based on Multi-similarity Measurements
Along with the development of Web2.0, folksonomy has become a hot topic related to data mining, information retrieval and social network. The tag semantic is the key for deep under...
Yexi Jiang, Changjie Tang, Kaikuo Xu, Lei Duan, Li...
EVOW
2003
Springer
13 years 12 months ago
Comparison of AdaBoost and Genetic Programming for Combining Neural Networks for Drug Discovery
Genetic programming (GP) based data fusion and AdaBoost can both improve in vitro prediction of Cytochrome P450 activity by combining artificial neural networks (ANN). Pharmaceuti...
William B. Langdon, S. J. Barrett, Bernard F. Buxt...