Sciweavers

386 search results - page 32 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 8 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ASP
2001
Springer
14 years 1 months ago
Answer Set Programming and Bounded Model Checking
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. This is an extension of earlier w...
Keijo Heljanko, Ilkka Niemelä
SOFTCO
2004
Springer
14 years 2 months ago
Designing Neural Networks Using Gene Expression Programming
Abstract. An artificial neural network with all its elements is a rather complex structure, not easily constructed and/or trained to perform a particular task. Consequently, severa...
Cândida Ferreira
WSC
2007
13 years 11 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
EVOW
2007
Springer
14 years 2 months ago
Bio-mimetic Evolutionary Reverse Engineering of Genetic Regulatory Networks
The effective reverse engineering of biochemical networks is one of the great challenges of systems biology. The contribution of this paper is two-fold: 1) We introduce a new meth...
Daniel Marbach, Claudio Mattiussi, Dario Floreano