Sciweavers

334 search results - page 18 / 67
» Improving Intrusion Detection Performance using Keyword Sele...
Sort
View
IJACTAICIT
2010
237views more  IJACTAICIT 2010»
13 years 4 months ago
Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm
In this paper, a neuro-fuzzy algorithm has been implemented to improve the path planning of a mobile robot based on modification of vector field histogram (VFH) approach using neu...
Ali H. Hamad, Fatima B. Ibrahim
KAIS
2006
87views more  KAIS 2006»
13 years 6 months ago
Improving the performance of 1D object classification by using the Electoral College
Abstract It has been proven that districted matching schemes (e.g., the US presidential election scheme, also called the Electoral College) are more stable than undistricted matchi...
Liang Chen, Ruoyu Chen, Sharmin Nilufar
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
14 years 21 days ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
DSN
2005
IEEE
14 years 11 days ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
IJCNN
2006
IEEE
14 years 24 days ago
C2FS: An Algorithm for Feature Selection in Cascade Neural Networks
Wrapper-based feature selection is attractive because wrapper methods are able to optimize the features they select to the specific learning algorithm. Unfortunately, wrapper met...
Lars Backstrom, Rich Caruana