Sciweavers

329 search results - page 41 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
LCN
2008
IEEE
14 years 2 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
DISCEX
2003
IEEE
14 years 27 days ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
IJCNN
2006
IEEE
14 years 1 months ago
A computational intelligence-based criterion to detect non-stationarity trends
—The stationarity hypothesis is largely and implicitly assumed when designing classifiers (especially those for industrial applications) but it does not generally hold in practic...
Cesare Alippi, Manuel Roveri
ISVC
2007
Springer
14 years 1 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
ICDE
2005
IEEE
111views Database» more  ICDE 2005»
14 years 9 months ago
Online Latent Variable Detection in Sensor Networks
Sensor networks attract increasing interest, for a broad range of applications. Given a sensor network, one key issue becomes how to utilize it efficiently and effectively. In par...
Jimeng Sun, Spiros Papadimitriou, Christos Falouts...