Sciweavers

417 search results - page 39 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
TEC
2002
89views more  TEC 2002»
13 years 7 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
BMCBI
2008
143views more  BMCBI 2008»
13 years 8 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus
EUROSSC
2007
Springer
14 years 2 months ago
Escalation:  Complex Event Detection in Wireless Sensor Networks
We present a new approach for the detection of complex events in Wireless Sensor Networks. Complex events are sets of data points that correspond to interesting or unusual patterns...
Michael Zoumboulakis, George Roussos
KDD
2004
ACM
157views Data Mining» more  KDD 2004»
14 years 1 months ago
On detecting space-time clusters
Detection of space-time clusters is an important function in various domains (e.g., epidemiology and public health). The pioneering work on the spatial scan statistic is often use...
Vijay S. Iyengar
CCS
2007
ACM
14 years 2 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...