Sciweavers

496 search results - page 58 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
ACII
2007
Springer
14 years 2 months ago
Metaphor and Affect Detection in an ICA
We discuss an aspect of an affect-detection system used in edrama by intelligent conversational agents, namely affective interpretation of limited sorts of metaphorical utterance. ...
Timothy H. Rumbell, C. J. Smith, John A. Barnden, ...
ACMSE
2005
ACM
13 years 10 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
RAID
2010
Springer
13 years 6 months ago
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...
CVPR
2008
IEEE
14 years 10 months ago
Discriminative local binary patterns for human detection in personal album
In recent years, local pattern based object detection and recognition have attracted increasing interest in computer vision research community. However, to our best knowledge no p...
Yadong Mu, Shuicheng Yan, Yi Liu, Thomas S. Huang,...