Some of the applications of neural network techniques in different methods, in computational electromagnetics, are highlighted. Applications in finite element method for automated mesh generation are described. Extrapolation of the FDTD data using FIR filterbased neural network is illustrated. Use o
An overview of network evasion methods
โ Scribed by Brian Hernacki; Jeremy Bennett; James Hoagland
- Publisher
- Elsevier Science
- Year
- 2005
- Tongue
- English
- Weight
- 244 KB
- Volume
- 10
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
โฆ Synopsis
In recent years much attention has been paid in the network security space to a variety of issues including performance and detection capability. Resistance to evasion however has not been pursued with the same level of interest. During this time many of the technologies have evolved. New applications, protocols and services abound and even the security devices themselves have also become more complex. This lack of focus combined with significant change presents new risks. This paper provides an overview of evasion techniques both new and old, and considers them relative to current technologies.
๐ SIMILAR VOLUMES
The ordered weighted aggregation ~OWA! operator has received more and more attention since its appearance. One key point in the OWA operator is to determine its associated weights. In this article, I first briefly review existing main methods for determining the weights associated with the OWA opera