Sciweavers

251 search results - page 16 / 51
» Using Rough Set and Support Vector Machine for Network Intru...
Sort
View
SWARM
2010
SPRINGER
154views Optimization» more  SWARM 2010»
13 years 7 months ago
An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization
This paper proposes an immune concentration based virus detection approach which utilizes a two-element concentration vector to construct the feature. In this approach, ‘self’ ...
Wei Wang, Pengtao Zhang, Ying Tan
SECON
2007
IEEE
14 years 3 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
CEAS
2011
Springer
12 years 8 months ago
Blocking spam by separating end-user machines from legitimate mail server machines
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
Fernando Sanchez, Zhenhai Duan, Yingfei Dong
IPCV
2008
13 years 10 months ago
Neonatal Facial Pain Detection Using NNSOA and LSVM
- We report classification experiments using the pilot Infant COPE database of neonatal facial expressions. Two sets of DCT coeffiecents were used to train a neural network simulta...
Sheryl Brahnam, Loris Nanni, Randall S. Sexton
CORR
2008
Springer
159views Education» more  CORR 2008»
13 years 9 months ago
Face Detection Using Adaboosted SVM-Based Component Classifier
: Boosting is a general method for improving the accuracy of any given learning algorithm. In this paper we employ combination of Adaboost with Support Vector Machine (SVM) as comp...
Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan,...