We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
In the eld of arti cial evolution creating methods to evolve neural networks is an important goal. But how to encode the structure and properties of the neural network in the geno...
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Landmines are a major problem facing the world today; there are millions of these deadly weapons still buried in various countries around the world. Humanitarian organizations dedi...
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...