Sciweavers

2429 search results - page 95 / 486
» Toposemantic Network Clustering
Sort
View
160
Voted
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 8 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
124
Voted
ICDE
2010
IEEE
173views Database» more  ICDE 2010»
15 years 11 months ago
Progressive clustering of networks using Structure-Connected Order of Traversal
— Network clustering enables us to view a complex network at the macro level, by grouping its nodes into units whose characteristics and interrelationships are easier to analyze ...
Dustin Bortner, Jiawei Han
NETCOOP
2009
Springer
15 years 11 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
115
Voted
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 5 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
AUSFORENSICS
2004
15 years 6 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot