Sciweavers

248 search results - page 30 / 50
» Characterizing a spam traffic
Sort
View
COMCOM
2006
92views more  COMCOM 2006»
14 years 9 months ago
Loss and Delay Measurements of Internet Backbones
As the Internet evolves into a universal network for all communication needs, it has to stand up to the high quality standards of traditional networks, such as the telephone netwo...
Athina Markopoulou, Fouad A. Tobagi, Mansour J. Ka...
ECCV
2008
Springer
15 years 11 months ago
Multi-layered Decomposition of Recurrent Scenes
Abstract. There is considerable interest in techniques capable of identifying anomalies and unusual events in busy outdoor scenes, e.g. road junctions. Many approaches achieve this...
David Mark Russell, Shaogang Gong
WORM
2004
14 years 10 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
CICLING
2011
Springer
14 years 1 months ago
Wikipedia Vandalism Detection: Combining Natural Language, Metadata, and Reputation Features
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
B. Thomas Adler, Luca de Alfaro, Santiago Mois&eac...
TIFS
2008
136views more  TIFS 2008»
14 years 9 months ago
Distributed Detection of Information Flows
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...
Ting He, Lang Tong