Sciweavers

988 search results - page 151 / 198
» Intrusion Detection with Neural Networks
Sort
View
IJON
2002
67views more  IJON 2002»
13 years 7 months ago
Test of spike-sorting algorithms on the basis of simulated network data
: Results of spike sorting algorithms are usually compared against recorded signals which themselves underly interpretations, distortions and errors. Our approach is to provide and...
Kerstin M. L. Menne, Andre Folkers, Thomas Malina,...
NETWORK
2007
234views more  NETWORK 2007»
13 years 7 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 1 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
INFOCOM
2008
IEEE
14 years 2 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin
LCN
2008
IEEE
14 years 2 months ago
DiCAP: Distributed Packet Capturing architecture for high-speed network links
— IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge ...
Cristian Morariu, Burkhard Stiller