As the Internet evolves into a universal network for all communication needs, it has to stand up to the high quality standards of traditional networks, such as the telephone netwo...
Athina Markopoulou, Fouad A. Tobagi, Mansour J. Ka...
Abstract. There is considerable interest in techniques capable of identifying anomalies and unusual events in busy outdoor scenes, e.g. road junctions. Many approaches achieve this...
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
B. Thomas Adler, Luca de Alfaro, Santiago Mois&eac...
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...