Sciweavers

1075 search results - page 55 / 215
» Communities Detection in Large Networks
Sort
View
CN
2007
168views more  CN 2007»
14 years 9 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
JSAC
2006
163views more  JSAC 2006»
14 years 9 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
BMCBI
2006
142views more  BMCBI 2006»
14 years 9 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...
ACSAC
2010
IEEE
14 years 7 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
INFOCOM
2010
IEEE
14 years 8 months ago
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta