Sciweavers

988 search results - page 104 / 198
» Intrusion Detection with Neural Networks
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
EC
2000
136views ECommerce» more  EC 2000»
13 years 8 months ago
Architecture for an Artificial Immune System
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynam...
Steven A. Hofmeyr, Stephanie Forrest
ICANN
1997
Springer
14 years 9 days ago
Corner Detection in Color Images by Multiscale Combination of End-Stopped Cortical Cells
We present a corner-detection algorithm based on a model for end-stopping cells in the visual cortex. Shortcomings of this model are overcome by a combination over several scales. ...
Rolf P. Würtz, Tino Lourens
AIA
2007
13 years 9 months ago
Optimizing number of hidden neurons in neural networks
In this paper, a novel and effective criterion based on the estimation of the signal-to-noise-ratio figure (SNRF) is proposed to optimize the number of hidden neurons in neural ne...
Yue Liu, Janusz A. Starzyk, Zhen Zhu
ICANN
2007
Springer
14 years 2 months ago
Event Detection and Localization in Mobile Robot Navigation Using Reservoir Computing
Abstract. Reservoir Computing (RC) uses a randomly created recurrent neural network where only a linear readout layer is trained. In this work, RC is used for detecting complex eve...
Eric A. Antonelo, Benjamin Schrauwen, Xavier Dutoi...