Sciweavers

440 search results - page 52 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
138
Voted
BIRD
2008
Springer
159views Bioinformatics» more  BIRD 2008»
15 years 5 months ago
Exploration of Evolutionary Relations between Protein Structures
Abstract. We describe a new method for the exploration of evolutionary relations between protein structures. The approach is based on the ESSM algorithm for detecting structural mu...
Natalja Kurbatova, Juris Viksna
118
Voted
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 9 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
133
Voted
CCS
2006
ACM
15 years 7 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
164
Voted
JMLR
2008
148views more  JMLR 2008»
15 years 3 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
158
Voted
DIM
2009
ACM
15 years 8 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad