Sciweavers

799 search results - page 119 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 1 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
DSOM
2006
Springer
13 years 11 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
ATAL
2009
Springer
14 years 2 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
BMCBI
2010
100views more  BMCBI 2010»
13 years 8 months ago
Trimming of mammalian transcriptional networks using network component analysis
Background: Network Component Analysis (NCA) has been used to deduce the activities of transcription factors (TFs) from gene expression data and the TF-gene binding relationship. ...
Linh M. Tran, Daniel R. Hyduke, James C. Liao
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 2 months ago
A Framework for Optimizing the Uplink Performance of Distributed Antenna Systems under a Constrained Backhaul
Abstract— It has recently been shown that multi-cell cooperations in cellular networks, enabling distributed antenna systems and joint transmission or joint detection across cell...
Patrick Marsch, Gerhard Fettweis