Sciweavers

50 search results - page 3 / 10
» Business process impact visualization and anomaly detection
Sort
View
PST
2004
13 years 7 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 7 days ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
JSAC
2006
165views more  JSAC 2006»
13 years 5 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
13 years 7 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
HCI
2009
13 years 3 months ago
Impact of Gaze Analysis on the Design of a Caption Production Software
Producing caption for the deaf and hearing impaired is a labor intensive task. We implemented a software tool, named SmartCaption, for assisting the caption production process usin...
Claude Chapdelaine, Samuel Foucher, Langis Gagnon