Sciweavers

334 search results - page 22 / 67
» Improving Intrusion Detection Performance using Keyword Sele...
Sort
View
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 1 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
FSKD
2005
Springer
180views Fuzzy Logic» more  FSKD 2005»
14 years 9 days ago
An Effective Feature Selection Scheme via Genetic Algorithm Using Mutual Information
Abstract. In the artificial neural networks (ANNs), feature selection is a wellresearched problem, which can improve the network performance and speed up the training of the networ...
Chunkai K. Zhang, Hong Hu
ICC
2009
IEEE
123views Communications» more  ICC 2009»
14 years 1 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
NN
1998
Springer
156views Neural Networks» more  NN 1998»
13 years 6 months ago
Automatic early stopping using cross validation: quantifying the criteria
Cross validation can be used to detect when over tting starts during supervised training of a neural network; training is then stopped before convergence to avoid the overtting  ...
Lutz Prechelt
RAID
2010
Springer
13 years 5 months ago
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...