Sciweavers

420 search results - page 70 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 7 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ESAW
2007
Springer
14 years 2 months ago
Multi-agent Simulation to Implementation: A Practical Engineering Methodology for Designing Space Flight Operations
OCAMS is a practical engineering application of multi-agent systems technology, involving redesign of the tools and practices in a complex, distributed system. OCAMS is designed to...
William J. Clancey, Maarten Sierhuis, Chin Seah, C...
CIKM
2009
Springer
14 years 3 months ago
Cross-language linking of news stories on the web using interlingual topic modelling
We have studied the problem of linking event information across different languages without the use of translation systems or dictionaries. The linking is based on interlingua in...
Wim De Smet, Marie-Francine Moens
CEC
2008
IEEE
14 years 3 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
COMSIS
2006
129views more  COMSIS 2006»
13 years 8 months ago
Constraint-Based Knowledge Representation for Individualized Instruction
Traditional knowledge representations were developed to encode complete, explicit and executable programs, a goal that makes them less than ideal for representing the incomplete an...
Stellan Ohlsson, Antonija Mitrovic