Sciweavers

988 search results - page 141 / 198
» Intrusion Detection with Neural Networks
Sort
View
NSDI
2004
13 years 9 months ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...
JNCA
2007
136views more  JNCA 2007»
13 years 8 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
IJON
2008
186views more  IJON 2008»
13 years 8 months ago
Computational analysis and learning for a biologically motivated model of boundary detection
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
ICIP
2005
IEEE
14 years 9 months ago
Trainable post-processing method to reduce false alarms in the detection of small blotches of archive films
We have developed a new semi-automatic neural network based method to detect blotches with low false alarm rate on archive films. Blotches can be modeled as temporal intensity disc...
Attila Licsár, László Cz&uacu...
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
14 years 1 months ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...