- Full text PDF available (5)
Firewalls are network devices which enforce an organization's security policy. Since their development , various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application , transport, and network, and data-link levels. In addition,… (More)
How to effectively generate detectors is one of the important problems of negative selection algorithm and its practicability. In this paper, a new algorithm which adaptively generates detectors is proposed. This algorithm can regulate current detector set according to actual circumstances, and quickly detect abnormal changes in a very large non-self space… (More)
Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immune system (BIS). It possesses the abilities of self-adapting, self-learning and self-configuration. It has the basic function to distinguish self and non-self. Negative Selection Algorithm (NSA) over the years has shown to be competent for anomaly detection… (More)
in near linear time with randomization and a simple pruning rule. A monitoring display of multivariate outliers.
In learning from demonstration (LfD) a human trainer demonstrates desired behaviors to a robotic agent, creating a training set that the agent can learn from. LfD allows non-programmers to easily and naturally train robotic agents to perform specific tasks. However, to date most LfD has focused on single robot, single trainer paradigms leading to… (More)