Results 51 to 60 of about 230,799 (122)

Classification of artificial intelligence ids for smurf attack [PDF]

open access: yesIJAIA (2012);, 2012
Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network.
arxiv  

Randomized Dynamic Mode Decomposition for Non-Intrusive Reduced Order Modelling [PDF]

open access: yesarXiv, 2016
This paper focuses on a new framework for reduced order modelling of non-intrusive data with application to 2D flows. To overcome the shortcomings of intrusive model order reduction usually derived by combining the POD and the Galerkin projection methods, we developed a novel technique based on Randomized Dynamic Mode Decomposition as a fast and ...
arxiv  

A Renewal Model of Intrusion [PDF]

open access: yesarXiv, 2017
We present a probabilistic model of an intrusion in a renewal process. Given a process and a sequence of events, an intrusion is a subsequence of events that is not produced by the process. Applications of the model are, for example, online payment fraud with the fraudster taking over a user's account and performing payments on the user's behalf, or ...
arxiv  

Intrusion Detection using Sequential Hybrid Model [PDF]

open access: yesarXiv, 2019
A large amount of work has been done on the KDD 99 dataset, most of which includes the use of a hybrid anomaly and misuse detection model done in parallel with each other. In order to further classify the intrusions, our approach to network intrusion detection includes use of two different anomaly detection models followed by misuse detection applied ...
arxiv  

Home - About - Disclaimer - Privacy