Sciweavers

988 search results - page 115 / 198
» Intrusion Detection with Neural Networks
Sort
View
ISBI
2002
IEEE
14 years 8 months ago
Optimal nonlinear estimation of photon coordinates in PET
We consider detection of high-energy photons in PET using thick scintillation crystals. Parallax effect and multiple Compton interactions in this type of crystals significantly re...
Alexander M. Bronstein, Michael M. Bronstein, Mich...
NN
2008
Springer
114views Neural Networks» more  NN 2008»
13 years 8 months ago
Event detection and localization for small mobile robots using reservoir computing
Reservoir Computing (RC) techniques use a fixed (usually randomly created) recurrent neural network, or more generally any dynamic system, which operates at the edge of stability,...
Eric A. Antonelo, Benjamin Schrauwen, Dirk Strooba...
USS
2010
13 years 6 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
ISM
2005
IEEE
84views Multimedia» more  ISM 2005»
14 years 1 months ago
The Protection of QoS for Multimedia Transmission against Denial of Service Attacks
In this paper, a secure and adaptive multimedia transmission framework is proposed to maintain the quality of service (QoS) of the multimedia streams during the Denial-of-Service ...
Hongli Luo, Mei-Ling Shyu
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
13 years 11 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...