Sciweavers

263 search results - page 49 / 53
» Adaptive Defense Against Various Network Attacks
Sort
View
COMSUR
2011
221views Hardware» more  COMSUR 2011»
13 years 9 months ago
Computational Intelligence in Wireless Sensor Networks: A Survey
—Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many chall...
Raghavendra V. Kulkarni, A. Forster, Ganesh K. Ven...
SIGMOD
2006
ACM
129views Database» more  SIGMOD 2006»
15 years 9 months ago
InMAF: indexing music databases via multiple acoustic features
Music information processing has become very important due to the ever-growing amount of music data from emerging applications. In this demonstration, we present a novel approach ...
Jialie Shen, John Shepherd, Anne H. H. Ngu
INFOCOM
2007
IEEE
15 years 3 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ACSAC
2009
IEEE
15 years 4 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...