We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
A semi-auto system is developed to acquire playerpossession for broadcast soccer video, whose objective is to minimize the manual work. This research is important because acquirin...
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...