Sciweavers

329 search results - page 60 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
RAID
2005
Springer
14 years 29 days ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
IEICET
2006
112views more  IEICET 2006»
13 years 7 months ago
Background TCP Data Transfer with Inline Network Measurement
In the present paper, ImTCP-bg, a new background TCP data transfer mechanism that uses an inline network measurement technique, is proposed. ImTCP-bg sets the upper limit of the co...
Tomoaki Tsugawa, Go Hasegawa, Masayuki Murata
IJCNN
2006
IEEE
14 years 1 months ago
Comparing Kernels for Predicting Protein Binding Sites from Amino Acid Sequence
— The ability to identify protein binding sites and to detect specific amino acid residues that contribute to the specificity and affinity of protein interactions has importan...
Feihong Wu
ISCC
2003
IEEE
153views Communications» more  ISCC 2003»
14 years 23 days ago
Fuzzy Explicit Marking for Congestion Control in Differentiated Services Networks
This paper presents a new active queue management scheme, Fuzzy Explicit Marking (FEM), implemented within the differentiated services (Diff-Serv) framework to provide congestion ...
Chrysostomos Chrysostomou, Andreas Pitsillides, Ge...
CEC
2008
IEEE
14 years 1 months ago
Automatic model type selection with heterogeneous evolution: An application to RF circuit block modeling
— Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a cost effe...
Dirk Gorissen, Luciano De Tommasi, Jeroen Croon, T...