Sciweavers

988 search results - page 99 / 198
» Intrusion Detection with Neural Networks
Sort
View
RAID
2004
Springer
14 years 1 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
CSREASAM
2006
13 years 9 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
IWANN
2001
Springer
14 years 18 days ago
Landmark Recognition for Autonomous Navigation Using Odometric Information and a Network of Perceptrons
In this paper two methods for the detection and recognition of landmarks to be used in topological modeling for autonomous mobile robots are presented. The first method is based o...
Javier de Lope Asiaín, Darío Maraval...
ICCCN
2007
IEEE
14 years 2 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ICMLA
2004
13 years 9 months ago
Outlier detection and evaluation by network flow
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Ying Liu, Alan P. Sprague