Sciweavers

249 search results - page 43 / 50
» A nonself space approach to network anomaly detection
Sort
View
PR
2007
101views more  PR 2007»
14 years 9 months ago
Use of power law models in detecting region of interest
In this paper, we shall address the issue of semantic extraction of different regions of interest. The proposed approach is based on statistical methods and models inspired from l...
Yves Caron, Pascal Makris, Nicole Vincent
84
Voted
AAAI
2008
14 years 12 months ago
Markov Blanket Feature Selection for Support Vector Machines
Based on Information Theory, optimal feature selection should be carried out by searching Markov blankets. In this paper, we formally analyze the current Markov blanket discovery ...
Jianqiang Shen, Lida Li, Weng-Keen Wong
ASUNAM
2011
IEEE
13 years 9 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
RAID
2007
Springer
15 years 3 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
JCST
2010
119views more  JCST 2010»
14 years 8 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian