Sciweavers

194 search results - page 2 / 39
» Misuse Detection for Information Retrieval Systems: A Prelim...
Sort
View
DFN
2009
13 years 5 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
IEEEIAS
2008
IEEE
13 years 11 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
CAIVD
1998
182views more  CAIVD 1998»
13 years 6 months ago
Content-Based 3D Neuroradiologic Image Retrieval: Preliminary Results
A content-based 3D neuroradiologic image retrieval system is being developed at the Robotics Institute of CMU. The special characteristics of this system include: 1 directly deali...
Yanxi Liu, William E. Rothfus, Takeo Kanade
PTS
2007
120views Hardware» more  PTS 2007»
13 years 6 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
KDD
1995
ACM
139views Data Mining» more  KDD 1995»
13 years 8 months ago
Resource and Knowledge Discovery in Global Information Systems: A Preliminary Design and Experiment
Eficient and efiective discovery of resource and knowledge from the Internet has become an imminent research issue, especially with the advent of the Information Super-Highway. A ...
Osmar R. Zaïane, Jiawei Han