Sciweavers

988 search results - page 115 / 198
» Intrusion Detection with Neural Networks
Sort
View
108
Voted
ISBI
2002
IEEE
16 years 4 months ago
Optimal nonlinear estimation of photon coordinates in PET
We consider detection of high-energy photons in PET using thick scintillation crystals. Parallax effect and multiple Compton interactions in this type of crystals significantly re...
Alexander M. Bronstein, Michael M. Bronstein, Mich...
123
Voted
NN
2008
Springer
114views Neural Networks» more  NN 2008»
15 years 3 months ago
Event detection and localization for small mobile robots using reservoir computing
Reservoir Computing (RC) techniques use a fixed (usually randomly created) recurrent neural network, or more generally any dynamic system, which operates at the edge of stability,...
Eric A. Antonelo, Benjamin Schrauwen, Dirk Strooba...
165
Voted
USS
2010
15 years 1 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
134
Voted
ISM
2005
IEEE
84views Multimedia» more  ISM 2005»
15 years 9 months ago
The Protection of QoS for Multimedia Transmission against Denial of Service Attacks
In this paper, a secure and adaptive multimedia transmission framework is proposed to maintain the quality of service (QoS) of the multimedia streams during the Denial-of-Service ...
Hongli Luo, Mei-Ling Shyu
114
Voted
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
15 years 7 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...