Sciweavers

1318 search results - page 262 / 264
» Measuring network security using dynamic bayesian network
Sort
View
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 3 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
ICDCS
2008
IEEE
14 years 12 days ago
Toward Predictive Failure Management for Distributed Stream Processing Systems
Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is ess...
Xiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Sh...
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
13 years 9 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
ICDE
2007
IEEE
183views Database» more  ICDE 2007»
14 years 7 months ago
SpADe: On Shape-based Pattern Detection in Streaming Time Series
Monitoring predefined patterns in streaming time series is useful to applications such as trend-related analysis, sensor networks and video surveillance. Most current studies on s...
Yueguo Chen, Mario A. Nascimento, Beng Chin Ooi, A...
ALGOSENSORS
2007
Springer
14 years 4 days ago
Counting Targets with Mobile Sensors in an Unknown Environment
Abstract. We consider the problem of counting the number of indistinguishable targets using a simple binary sensing model. Our setting includes an unknown number of point targets i...
Beat Gfeller, Matús Mihalák, Subhash...