Sciweavers

988 search results - page 81 / 198
» Intrusion Detection with Neural Networks
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
IJCNN
2000
IEEE
14 years 18 days ago
Evolving Neural Network Structures Using Axonal Growth Mechanisms
In the eld of arti cial evolution creating methods to evolve neural networks is an important goal. But how to encode the structure and properties of the neural network in the geno...
Peter Eggenberger
ICDCSW
2005
IEEE
14 years 1 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
NPL
2006
113views more  NPL 2006»
13 years 8 months ago
A Back-propagation Neural Network Landmine Detector Using the Delta-technique and S-statistic
Landmines are a major problem facing the world today; there are millions of these deadly weapons still buried in various countries around the world. Humanitarian organizations dedi...
Taskin Koçak, Matthew Draper
ANCS
2009
ACM
13 years 6 months ago
OASis: towards extensible open-architecture services platforms
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...
Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo ...