Sciweavers

420 search results - page 65 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
IJHR
2008
117views more  IJHR 2008»
13 years 8 months ago
Implementation of Cognitive Control for a Humanoid Robot
Engineers have long used control systems utilizing models and feedback loops to control realworld systems. Limitations of model-based control led to a generation of intelligent co...
Kazuhiko Kawamura, Stephen M. Gordon, Palis Ratana...
CCS
2009
ACM
14 years 3 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
IWIA
2005
IEEE
14 years 2 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
AAAI
2007
13 years 11 months ago
COD: Online Temporal Clustering for Outbreak Detection
We present Cluster Onset Detection (COD), a novel algorithm to aid in detection of epidemic outbreaks. COD employs unsupervised learning techniques in an online setting to partiti...
Tomás Singliar, Denver Dash
FLAIRS
2006
13 years 10 months ago
Fuzzy Model Optimization Using Genetic Algorithm for Aircraft Engine Diagnosis
An accurate and up-to-date diagnostic model is critical for economic aircraft engine operation. However, for many commercial airline fleets, monitoring and diagnosing engine fault...
LiJie Yu, Daniel J. Cleary, Mark D. Osborn, Vrinda...