Results 381-400 of 401.
Bookmark and Share    
Full Text
Peer Reviewed
See detailAdaptive and Dynamic Intrusion Detection by Means of Idiotypic Networks Paradigm
Ostaszewski, Marek UL; Bouvry, Pascal UL; Seredynski, Franciszek

in The 21th IEEE International Parallel and Distributed Processing Symposium (IPDPS), NIDISC Workshop. (2008)

In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like ... [more ▼]

In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS is evaluated on the MIT'99 dataset and outperforms previous approaches for DoS detection applied to this set. [less ▲]

Detailed reference viewed: 152 (0 UL)
Peer Reviewed
See detailNature inspired Algorithm-Based Fault Tolerance on Global Computing Platforms. Application to Symbolic Regression
Varrette, Sébastien UL; Ostaszewski, Marek UL; Bouvry, Pascal UL

in International Conference on Metaheuristics and Nature Inspired Computing (META'08) (2008)

Detailed reference viewed: 95 (0 UL)
Peer Reviewed
See detailOn the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning
Dunlop, Dominic UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'08) (2008)

Detailed reference viewed: 127 (0 UL)
Peer Reviewed
See detailA Context-Aware Broadcast Protocol for Mobile Wireless Networks
Hogie, Luc UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in Second International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences (MCO 2008) (2008)

Detailed reference viewed: 124 (5 UL)
Peer Reviewed
See detailEvaluation of Different Optimization Techniques in the Design of Ad Hoc Injection Networks
Dorronsoro, Bernabé UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS008) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008). (2008)

Detailed reference viewed: 92 (5 UL)
Full Text
Peer Reviewed
See detailBODYF - A Parameterless Broadcasting Protocol over Dynamic Forests
Ruiz, Patricia UL; Khadraoui, Djamel; Andronache, Adrian UL et al

in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS'08) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008) (2008)

Detailed reference viewed: 308 (7 UL)
Full Text
Peer Reviewed
See detailCoevolutionary-based Mechanisms for Network Anomaly Detection
Ostaszewski, Marek UL; Seredynski, Franciszek; Bouvry, Pascal UL

in Journal of Mathematical Modelling and Algorithms (2007), 6(3), 411-431

The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a ... [more ▼]

The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a model of the network behavior based on the self-nonself space paradigm. Covering both self and nonself spaces by hyperrectangular structures is proposed. The structures corresponding to self-space are built using a training set from this space. The hyperrectangular detectors covering nonself space are created using a niching genetic algorithm. A coevolutionary algorithm is proposed to enhance this process. The results of experiments show a high quality of intrusion detection, which outperform the quality of the recently proposed approach based on a hypersphere representation of the self-space. [less ▲]

Detailed reference viewed: 155 (2 UL)
Peer Reviewed
See detailCoevolutionary Genetic Algorithms for Ad Hoc Injection Networks Design Optimization
Danoy, Grégoire UL; Bouvry, Pascal UL; Hogie, Luc UL

in Congress on Evolutionary Computation (CEC) (2007)

Detailed reference viewed: 125 (6 UL)
Peer Reviewed
See detailDistributed Coevolutionary Genetic Algorithm for Optimal Design of Ad Hoc Injection Networks
Danoy, Grégoire UL; Bouvry, Pascal UL; Alba, Enrique

in The 21st European Conference on Modeling and Simulation (ECMS 2007) (2007)

Detailed reference viewed: 68 (9 UL)
Peer Reviewed
See detailOptimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms
Danoy, Grégoire UL; Bouvry, Pascal UL; Brust, Matthias R. UL et al

in 9th annual conference on Genetic and evolutionary computation (GECCO '07) (2007)

Detailed reference viewed: 125 (3 UL)
Peer Reviewed
See detailchap "Cryptographie à clef secréte"
Bouvry, Pascal UL; Dumas, Jean-Guillaume; Gillard, Roland et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 101 (0 UL)
Peer Reviewed
See detailEvaluations of Strategies for Co-Evolutionary Genetic Algorithms: dLCGA Case Study
Danoy, Grégoire UL; Bouvry, Pascal UL; Seredynski, Franciszek

in ANNIE 2006: Proceedings of the 16th international conference on Artificial Neural Networks In Engineering (2006)

Detailed reference viewed: 97 (6 UL)
Peer Reviewed
See detailhLCGA: A Hybrid Competitive Coevolutionary Genetic Algorithm
Danoy, Grégoire UL; Bouvry, Pascal UL; Martins, Tomy

in HIS'06: Proceedings of the 6th international conference on Hybrid Intelligent Systems (2006)

Detailed reference viewed: 139 (5 UL)
See detailSécurité Réseau
Bernard, Nicolas UL; Bouvry, Pascal UL; Denneulin, Yves et al

in Leprévost, Franck; Ebrahimi, Touradj; Warusfel, Bertrand (Eds.) Cryptographie et sécurité de systèmes et réseaux (2006)

Detailed reference viewed: 123 (5 UL)
Peer Reviewed
See detailSimulating Realistic Mobility Models for Large Heterogeneous MANETs
Hogie, Luc UL; Bouvry, Pascal UL; Guinand, Frédéric et al

in 9th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'06) (2006)

Detailed reference viewed: 105 (3 UL)
Peer Reviewed
See detailchapter "Cryptographie à Clé Secrète"
Bouvry, Pascal UL; Dumas, J.-G.; Gillard, R. et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 100 (1 UL)
Peer Reviewed
See detailDafo, a multi-agent framework for decomposable functions optimization
Danoy, Grégoire UL; Bouvry, Pascal UL; Boissier, Olivier

in 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005) (2005)

Detailed reference viewed: 169 (7 UL)
Full Text
Peer Reviewed
See detailUn framework multi-agent pour algorithmes génétiques coévolutionnaires distribués
Danoy, Grégoire UL; Bouvry, Pascal UL; Boissier, Olivier

in Proceedings of the ROADEF (2005)

Detailed reference viewed: 114 (5 UL)
Peer Reviewed
See detailAgent-Based Optimization of Business Functions Using Coevolutionary Algorithms
Danoy, Grégoire UL; Bouvry, Pascal UL; Seredynski, Franciszek

in Proceedings of the International Conference on Information and Knowledge Engineering (2004)

Detailed reference viewed: 103 (3 UL)
Peer Reviewed
See detailAgent-based optimization of business functions using coevolutionary algorithms: the distributed warehouse management case study
Danoy, Grégoire UL; Bouvry, Pascal UL; Seredynski, F.

in AISTA 2004 (International Conference on Advances in Intelligent Systems - Theory and Applications) organized in cooperation with the IEEE Computer Society (2004)

Detailed reference viewed: 122 (6 UL)