Sciweavers

270 search results - page 26 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 7 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
CVPR
2001
IEEE
14 years 9 months ago
Rapid Object Detection using a Boosted Cascade of Simple Features
This paper describes a machine learning approach for visual object detection which is capable of processing images extremely rapidly and achieving high detection rates. This wor...
Paul A. Viola, Michael J. Jones
IPMI
2007
Springer
14 years 1 months ago
Joint Sulci Detection Using Graphical Models and Boosted Priors
In this paper we propose an automated approach for joint sulci detection on cortical surfaces by using graphical models and boosting techniques to incorporate shape priors of major...
Yonggang Shi, Zhuowen Tu, Allan L. Reiss, Rebecca ...
ICPR
2010
IEEE
13 years 6 months ago
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT
The quality of the lung nodule models determines the success of lung nodule detection. This paper describes aspects of our data-driven approach for modeling lung nodules using the...
Amal Farag, James Graham, Aly A. Farag