Sciweavers

270 search results - page 24 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
VLSISP
2002
114views more  VLSISP 2002»
13 years 7 months ago
Image processing using cellular neural networks based on multi-valued and universal binary neurons
Multi-valued and universal binary neurons (MVN and UBN) are the neural processing elements with the complex-valued weights and high functionality. It is possible to implement an a...
Igor N. Aizenberg, Constantine Butakoff
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
13 years 11 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
14 years 1 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
CVPR
2001
IEEE
14 years 9 months ago
Learning Representative Local Features for Face Detection
This paper describes a face detection approach via learning local features. The key idea is that local features, being manifested by a collection of pixels in a local region, are ...
Xiangrong Chen, Lie Gu, Stan Z. Li, HongJiang Zhan...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin