Sciweavers

9 search results - page 1 / 2
» Visual Behavior Characterization for Intrusion Detection in ...
Sort
View
VIIP
2001
13 years 6 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
PTS
2007
120views Hardware» more  PTS 2007»
13 years 6 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
GLOBECOM
2009
IEEE
13 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
ICDCS
2009
IEEE
14 years 1 months ago
Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems
With the growing complexity in computer systems, it has been a real challenge to detect and diagnose problems in today’s large-scale distributed systems. Usually, the correlatio...
Jing Gao, Guofei Jiang, Haifeng Chen, Jiawei Han
BMCBI
2010
191views more  BMCBI 2010»
13 years 4 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...