Sciweavers

1075 search results - page 114 / 215
» Communities Detection in Large Networks
Sort
View
EIT
2008
IEEE
15 years 4 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
PAKDD
2010
ACM
193views Data Mining» more  PAKDD 2010»
14 years 8 months ago
As Time Goes by: Discovering Eras in Evolving Social Networks
Abstract. Within the large body of research in complex network analysis, an important topic is the temporal evolution of networks. Existing approaches aim at analyzing the evolutio...
Michele Berlingerio, Michele Coscia, Fosca Giannot...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 10 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ICNP
2006
IEEE
15 years 4 months ago
Internet Cache Pollution Attacks and Countermeasures
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...
CCS
2006
ACM
15 years 1 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...