Sciweavers

799 search results - page 17 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
14 years 2 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 7 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
IPPS
2005
IEEE
14 years 1 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
ESWA
2008
172views more  ESWA 2008»
13 years 7 months ago
DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant
DADICC is the abbreviated name for an intelligent system able to detect on-line and diagnose anomalies as soon as possible in the dynamic evolution of the behaviour of a power pla...
Antonio L. Arranz Matía, Alberto Cruz, Migu...
CONEXT
2010
ACM
13 years 5 months ago
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...