Sciweavers

329 search results - page 56 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
ICNP
2006
IEEE
14 years 1 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
IEEEIAS
2008
IEEE
14 years 1 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
IS
2010
13 years 6 months ago
ROC analysis of a fatigue classifier for vehicular drivers
— Few systems have been developed for the detection of fatigue / stress level of a vehicular driver in order to monitor and control the alertness level for preventing road accide...
Mahesh M. Bundele, Rahul Banerjee
INFOCOM
2008
IEEE
14 years 1 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
IJCNN
2006
IEEE
14 years 1 months ago
P-SVM Variable Selection for Discovering Dependencies Between Genetic and Brain Imaging Data
— The joint analysis of genetic and brain imaging data is the key to understand the genetic underpinnings of brain dysfunctions in several psychiatric diseases known to have a st...
Johannes Mohr, Imke Puis, Jana Wrase, Sepp Hochrei...