Sciweavers

4052 search results - page 252 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
SIGMOD
2003
ACM
209views Database» more  SIGMOD 2003»
16 years 4 months ago
Distributed Top-K Monitoring
The querying and analysis of data streams has been a topic of much recent interest, motivated by applications from the fields of networking, web usage analysis, sensor instrumenta...
Brian Babcock, Chris Olston
CHI
2004
ACM
16 years 4 months ago
User profiling
A number of global trends have a large influence on the way we use technology in our life and work, like: ? increasing connectivity and connected devices (any time, any place, any...
Johan Schuurmans, Boris E. R. de Ruyter, Harry van...
ICDCS
2012
IEEE
13 years 6 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
COMCOM
2008
126views more  COMCOM 2008»
15 years 4 months ago
Hi3: An efficient and secure networking architecture for mobile hosts
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity P...
Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, P...