scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Network and Computer Applications in 2007"


Journal ArticleDOI
TL;DR: Two hybrid approaches for modeling IDS are presented as a hierarchical hybrid intelligent system model (DT-SVM) and an ensemble approach combining the base classifiers to maximize detection accuracy and minimize computational complexity.

409 citations


Journal ArticleDOI
TL;DR: An approach to automatic visual recognition of expressive face and upper-body gestures from video sequences suitable for use in a vision-based affective multi-modal framework and fuse facial expression and affective body gesture information at the feature and at the decision level is presented.

346 citations


Journal ArticleDOI
TL;DR: A secure and efficient key management framework (SEKM) for mobile ad hoc networks that builds PKI by applying a secret sharing scheme and an underlying multicast server group and an efficient server group updating scheme is proposed.

215 citations


Journal ArticleDOI
TL;DR: The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few.

187 citations


Journal ArticleDOI
TL;DR: In this article, the authors evaluated three fuzzy rule-based classifiers to detect intrusions in a network and compared them with other machine learning techniques like decision trees, support vector machines and linear genetic programming.

181 citations


Journal ArticleDOI
TL;DR: The objective of this paper is to describe a fuzzy genetics-based learning algorithm and discuss its usage to detect intrusion in a computer network and presents some results and reports the performance of generated fuzzy rules in detecting intrusion inA computer network.

158 citations


Journal ArticleDOI
TL;DR: This paper proposes a region-based license plate detection method, which demonstrates to be more robust to interference characters and more accurate when compared with other methods.

150 citations


Journal ArticleDOI
TL;DR: An abridged history of agents is outlined as a guide for the reader to understand the trends and directions of future agent design and introduces a new paradigm that uses Intelligent Agents based on a Belief, Desire, and Intention architecture to achieve situation awareness in a hostile environment.

138 citations


Journal ArticleDOI
TL;DR: In this article, a method based on iterative rule learning using a fuzzy rule-based genetic classifier was proposed to provide an intelligent intrusion detection system (IIDS) that uses two of the most popular data mining tasks, namely classification and association rules mining together for predicting different behaviors in networked computers.

100 citations


Journal ArticleDOI
TL;DR: A simple scheme based on statistical analysis of multi-path (called SAM) is proposed to detect such attacks and to identify malicious nodes and results demonstrate that SAM successfully detects wormhole attacks and locates the malicious nodes in networks with different topologies and with different node transmission range.

83 citations


Journal ArticleDOI
TL;DR: This paper defines a protocol using homomorphic encryption techniques to exchange the data while keeping it private, and develops a secure protocol for multiple parties to conduct the desired computation.

Journal ArticleDOI
TL;DR: A novel approach to control devices with embedded web servers over the Internet and to form device networks such that their components can make use of one another's services and functions while improving the user interfaces is presented.

Journal ArticleDOI
TL;DR: This work proposes an ID-based version of public key infrastructure for providing secure communications in ad hoc networks based on PKI, and suggests that computation overheads of involved nodes in the scheme can be reduced by 25% at least.

Journal ArticleDOI
TL;DR: This paper presents the results of the ISO/IEC MPEG core experiment on using Semantic Web Services technology as a tool for declaratively describing the semantics of adaptation services and constructing multi-step adaptation sequences in an open and extensible multimedia adaptation framework and introduces declarative, knowledge-based technology into the involved multimedia communities.

Journal ArticleDOI
TL;DR: This paper proposes a simple but robust scheme to monitor changes in the local statistics and presents a learning algorithm to decide when to share information so that both the communication overhead among the distributed detection systems and the detection delay are minimized.

Journal ArticleDOI
TL;DR: A tradeoff algorithm based on Qualitative Reasoning, which the agents employ to determine the 'amount' of tradeoff associated with various agreement options is presented.

Journal ArticleDOI
MJ Callaghan1, Jim Harkin1, E. McColgan1, TM McGinnity1, Liam Maguire1 
TL;DR: This paper presents an architecture for a collaborative learning environment for remote experimentation in a Web based environment that accurately recreates the group working and tutor driven experience of traditional on-campus based laboratories.

Journal ArticleDOI
TL;DR: A new adaptive anomaly detection framework, based on the use of unsupervised evolving connectionist systems, is proposed, designed to adapt to normal behavior changes while still recognizing anomalies.

Journal ArticleDOI
TL;DR: In this paper, a vector quantization (VQ) system with watermarking ability is presented, which modifies the VQ indices to carry watermark bits, and a genetic codebook partition (GCP) procedure is employed to find a better way to split the codebook.

Journal ArticleDOI
TL;DR: This paper presents a particular scenario where access rules are based not only on the identity of the different users, but also on authorization data related to those users.

Journal ArticleDOI
TL;DR: An efficient replication algorithm is presented that utilizes the Zipf-like video popularity distributions to approximate the optimal solutions, which can reduce the complexity of the optimal replication algorithm and a heuristic algorithm based on simulated annealing is proposed.

Journal ArticleDOI
TL;DR: A minimalist methodology to develop usage-based recommender systems for multimedia digital libraries and evaluates the performance of the resulting system relative to an item-based collaborative filtering technique operating on user profiles extracted from the same log data.

Journal ArticleDOI
TL;DR: An architecture for sensor-based, distributed, automated scene surveillance to employ wireless visual sensors, scattered in an area, for detection and tracking of objects of interest and their movements through application of agents is presented.

Journal ArticleDOI
TL;DR: A taxonomy of approaches to per-class QoS differentiation is presented in an attempt to provide a common terminology and classification mechanism necessary in addressing this problem.

Journal ArticleDOI
TL;DR: Simulation results show that a multi-agent-based dynamic lifetime security scheme is highly effective to detect and block the two kinds of attacks.

Journal ArticleDOI
TL;DR: The proposed system is a suitable solution in terms of scalability, cost, interoperability and performance for traffic control systems, and can be easily adapted to other video applications and tools like command and control, surveillance or security systems for military and civilian applications.

Journal ArticleDOI
TL;DR: An effective protocol that can dynamically adjust the network topology by reducing the unnecessary relays is presented and a routing protocol is developed to reduce the path length and generate two disjoint routes for any pair of source and destination devices located in different piconets.

Journal ArticleDOI
TL;DR: A simple voting mechanism is applied to an ensemble of classifiers and a modest performance increase is achieved compared to the individual classifiers.

Journal ArticleDOI
TL;DR: This paper presents an integration of several user and resource-related factors for the design of dynamic adaptation techniques and proposes to adapt the streaming by prefetching and to model this decision problem by using a Markov decision process.

Journal ArticleDOI
TL;DR: It is outlined how composite web services are automatically implemented and systematically analysed using the target languages Bpel and Lotos (Language Of Temporal Ordering Specification).