Báo cáo hóa học: " Research Article A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets" potx
... Detect Network Attacks
Using G-HMM-Based Temporal Relations between
Internet Protocol Packets
Taeshik Shon,
1
Kyusuk Han,
2
James J. (Jong Hyuk) Park,
3
and Hangbae Chang
4
1
Division of Information ... of training data and two weeks of test data. Among
these datasets, we used attack-free training data for nor-
mal behavior modeling, and attack data was used to the
const...
... International Conference of Numerical Analysis and Applied Mathematics (ICNAAM ’10), AIP, Rhodes,
Greece, March 2010.
5 L. Carlitz, “q-Bernoulli numbers and polynomials,” Duke Mathematical Journal, ... q-Bernoulli
Numbers and q-Bernoulli Polynomials
Related to q-Bernstein Polynomials
Mehmet Ac¸ikg
¨
oz, Dilek Erdal, and Serkan Araci
Department of Mathematics, Faculty of Science and Arts,...
... decorrelate the
data in the least mean square (LMS) sense among all
linear orthogonal transforms. PCA is a linear orthogonal
transform from an m-dimensional space to p-dimensional
space, p
≤ ... Group, University of California at Berkeley,
CA, USA and the researchers in the SRI International, Speech
Technology and Research (STAR) Laboratory, Menlo Park,
CA, USA for many helpful discussi...
... are able to cooperate
with people as capable partners, that are able to learn
from natural human instruction and that are intuitive and
engaging for people to interact with, but that are also able ... ically Inspired Attention Mechanism for
a Social Robot
Antonio Jes
´
us Palomino, Rebeca Marfil, Juan Pedro Bandera, and Antonio Bandera
Grupo ISIS, Departamento de Tecnolog
´
a Electr...
... 395763, 10 pages
doi:10.1155/2010/395763
Research Article
A Novel Method for Improving Fairness over
Multiaccess Channels
Seyed Alireza Razavi and Ciprian Doru Giurc
˘
aneanu
Department of Signal Processing, ... strategy that combines the strengths of two
different MA schemes such that to guarantee a good tradeoff
between fairness and AME.
1.1. System Model. Consider a single-an...
... safe state to current attacked state;
(3) from previous attacked state to current safe state; and
(4) from previous attacked state to current attacked state.
Although the historical data obtained ... property, spatial property, and consistent property
of attacked locators to detect all attacked locators. The sensor
first applies both temporal and spatial properties to detect
so...
... China Grant no. 10971190.
References
1 S. Gala, “Regularity criteria for the 3D magneto-micropolar fluid equations in the Morrey-Campanato
space,” Nonlinear Differential Equations and Applications, ... Villamizar-Roa, and M. A. Rojas-Medar, “Micropolar fluids with vanishing
viscosity,” Abstract and Applied Analysis, vol. 2010, Article ID 843692, 18 pages, 2010.
15 C. Cao and J. Wu, “Two...
... M.R.Grossinho,F.M.Minh
´
os, and A. I. Santos, “Existence result for a third-order ODE with
nonlinear boundary conditions in presence of a sign-type Nagumo control,” Journal of Mathematical
Analysis and Applications, ... point boundary conditions,” Journal of Mathematical Analysis
and Applications, vol. 285, no. 1, pp. 174–190, 2003.
5 A. Cabada and R. L. Pouso, “Extremal solutions of...
... measures the average fraction of labels
14 EURASIP Journal on Advances in Signal Processing
[20] Y. Yang, “An evaluation of statistical approaches to text
categorization,” Journal of Information ... the authors present a Bayesian multilabel k-
nearest neighbor (MLkNN) approach where, in order to
assign a set of labels to a new instance, a decision is made
separately for each l...