Sciweavers

988 search results - page 37 / 198
» Intrusion Detection with Neural Networks
Sort
View
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 1 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 2 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
ALGOSENSORS
2007
Springer
13 years 10 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
TEC
2002
89views more  TEC 2002»
13 years 8 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
CDC
2008
IEEE
147views Control Systems» more  CDC 2008»
14 years 2 months ago
Clustering neural spike trains with transient responses
— The detection of transient responses, i.e. non– stationarities, that arise in a varying and small fraction of the total number of neural spike trains recorded from chronicall...
John D. Hunter, Jianhong Wu, John G. Milton