Sciweavers

988 search results - page 125 / 198
» Intrusion Detection with Neural Networks
Sort
View
NN
1998
Springer
156views Neural Networks» more  NN 1998»
13 years 7 months ago
Automatic early stopping using cross validation: quantifying the criteria
Cross validation can be used to detect when over tting starts during supervised training of a neural network; training is then stopped before convergence to avoid the overtting  ...
Lutz Prechelt
ISNN
2005
Springer
14 years 1 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
DAGM
2006
Springer
13 years 11 months ago
Efficient Algorithms for Similarity Measures over Sequential Data: A Look Beyond Kernels
Kernel functions as similarity measures for sequential data have been extensively studied in previous research. This contribution addresses the efficient computation of distance fu...
Konrad Rieck, Pavel Laskov, Klaus-Robert Müll...
ICANN
2010
Springer
13 years 6 months ago
Autonomous Generation of Internal Representations for Associative Learning
In this contribution, we explore the possibilities of learning in large-scale, multimodal processing systems operating under real-world conditions. Using an instance of a large-sca...
Michaël Garcia Ortiz, Benjamin Dittes, Jannik...