Sciweavers

988 search results - page 37 / 198
» Intrusion Detection with Neural Networks
Sort
View
147
Voted
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
15 years 9 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
125
Voted
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
15 years 10 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
138
Voted
ALGOSENSORS
2007
Springer
15 years 5 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
96
Voted
TEC
2002
89views more  TEC 2002»
15 years 3 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
127
Voted
CDC
2008
IEEE
147views Control Systems» more  CDC 2008»
15 years 10 months ago
Clustering neural spike trains with transient responses
— The detection of transient responses, i.e. non– stationarities, that arise in a varying and small fraction of the total number of neural spike trains recorded from chronicall...
John D. Hunter, Jianhong Wu, John G. Milton