Sciweavers

270 search results - page 39 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
ICCS
2007
Springer
14 years 1 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
13 years 11 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
IJIPT
2010
147views more  IJIPT 2010»
13 years 6 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
IJCV
2007
195views more  IJCV 2007»
13 years 7 months ago
Pre-Attentive and Attentive Detection of Humans in Wide-Field Scenes
We address the problem of localizing and obtaining high-resolution footage of the people present in a scene. We propose a biologically-inspired solution combining pre-attentive, lo...
James H. Elder, Simon J. D. Prince, Yuqian Hou, Mi...
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 7 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin