Sciweavers

33 search results - page 2 / 7
» Labeled VoIP Data-Set for Intrusion Detection Evaluation
Sort
View
KDD
2008
ACM
140views Data Mining» more  KDD 2008»
14 years 10 months ago
Semi-supervised approach to rapid and reliable labeling of large data sets
Supervised classification methods have been shown to be very effective for a large number of applications. They require a training data set whose instances are labeled to indicate...
György J. Simon, Vipin Kumar, Zhi-Li Zhang
ACSAC
2006
IEEE
14 years 3 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
ICNC
2005
Springer
14 years 3 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
CCS
2009
ACM
14 years 4 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
BMEI
2008
IEEE
14 years 4 months ago
Performance Evaluation and Fusion of Methods for Early Detection of Alzheimer Disease
The number of people that develop Alzheimer’s Disease (AD) is rapidly rising, while the initial diagnosis and care of AD patients typically falls on non-specialist and still tak...
Brahim Hamadicharef, Cuntai Guan, Emmanuel C. Ifea...