Sciweavers

1500 search results - page 220 / 300
» The Importance of Data Collection for Modelling Contact Netw...
Sort
View
DIMVA
2008
13 years 9 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
FLAIRS
2001
13 years 9 months ago
A Method for Evaluating Elicitation Schemes for Probabilities
We present an objective approach for evaluating probability elicitation methods in probabilistic models. Our method draws on ideas from research on learning Bayesian networks: if ...
Haiqin Wang, Denver Dash, Marek J. Druzdzel
WSC
1998
13 years 9 months ago
Discrete Event Simulation Experiments and Geographic Information Systems in Congestion Management Planning
A regional transportation system and the movement of large traffic volumes through it, are characteristic of stochastic systems. The standard traffic management or transportation ...
Roy Brooks Wiley, Thomas K. Keyser
ICANN
2003
Springer
14 years 29 days ago
An Adaptable Gaussian Neuro-Fuzzy Classifier
The concept of semantic and context aware intelligent systems provides a vision for the Information Society where the emphasis lays on computing applications that can sense context...
Minas Pertselakis, Dimitrios S. Frossyniotis, Andr...
ACSW
2006
13 years 9 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark