Sciweavers

270 search results - page 43 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
TMA
2010
Springer
314views Management» more  TMA 2010»
14 years 2 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
JNSM
2008
93views more  JNSM 2008»
13 years 7 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
IJON
2006
146views more  IJON 2006»
13 years 7 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
ICIRA
2010
Springer
124views Robotics» more  ICIRA 2010»
13 years 6 months ago
Evaluating the Fuzzy Coverage Model for 3D Multi-camera Network Applications
An intuitive three-dimensional task-oriented coverage model for 3D multi-camera networks based on fuzzy sets is presented. The model captures the vagueness inherent in the concept ...
Aaron Mavrinac, Jose Luis Alarcon Herrera, Xiang C...
FCCM
2011
IEEE
311views VLSI» more  FCCM 2011»
12 years 11 months ago
String Matching in Hardware Using the FM-Index
—String matching is a ubiquitous problem that arises in a wide range of applications in computing, e.g., packet routing, intrusion detection, web querying, and genome analysis. D...
Edward Fernandez, Walid Najjar, Stefano Lonardi