Sciweavers

329 search results - page 37 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
ISNN
2005
Springer
14 years 1 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
VLSISP
2002
114views more  VLSISP 2002»
13 years 7 months ago
Image processing using cellular neural networks based on multi-valued and universal binary neurons
Multi-valued and universal binary neurons (MVN and UBN) are the neural processing elements with the complex-valued weights and high functionality. It is possible to implement an a...
Igor N. Aizenberg, Constantine Butakoff
HPDC
2007
IEEE
13 years 11 months ago
Transparent network services via a virtual traffic layer for virtual machines
We claim that network services can be transparently added to existing unmodified applications running inside virtual machine environments. Examples of these network services inclu...
John R. Lange, Peter A. Dinda
CIBCB
2005
IEEE
14 years 1 months ago
A Neural Network for Predicting Protein Disorder using Amino Acid Hydropathy Values
— Proteins have been discovered to contain ordered regions and disordered regions, where ordered regions have a defined three-dimensional (3D) structure and disordered regions d...
Deborah Stoffer, L. Gwenn Volkert
AINA
2009
IEEE
14 years 2 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee