The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, machine learning technology often used as a recognition method of anomaly in anomaly detection. In this paper we have proposed a One-class small hypersphere support vector machine classifier (OCSHSVM) algorithm, which builds a learning classifier model via both normal and abnormal network traffic. This combination of normal and abnormal traffic for training model gives the better...
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. It has been shown that the problems of surplus maximization or volume maximization in combinatorial exchanges are inapproximable...
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. In this paper, we develop computationally efficient iterative auction mechanisms for solving combinatorial exchanges. Our...
Application based intrusion detection involves analysis of network packet payload data. Recently statistical methods for analyzing the payload are being used. Since behavior of every application is not same a different model is necessary for each application. Studies have revealed that higher order n-grams are good for capturing the network profile. In this paper we introduce a concept of layered...
Dynamic spectrum access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless network. The main design objectives for secondary user access strategy are to be able to "scavenge" spatio-temporally fragmented whitespace opportunities while limiting the amount of interference caused to the primary...
Dynamic spectrum access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless network. The main design objectives for secondary user access strategy are to be able to ??scavenge?? spatio-temporally fragmented whitespace opportunities while limiting the amount of interference caused to the primary users....
Most of the anomaly based techniques produce vast number of alert messages that include a large percentage of false alarms. One of the widely used technique for anomaly intrusion detection systems (IDS) is cluster analysis. In cluster based IDS, feature vectors generated from network traffic are grouped into clusters as normal or abnormal (raising alert). The main cause for false alert generation...
In this paper, we use reliability theory to determine the answer of an important question about how often we need to update a piece of secure information. For example, one may need to determine an appropriate time for updating a new password. To generalize, we compute an efficient updating time for a dependable secure computing (DSC) system which stores secret information in a reliable and secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.