Sciweavers

4052 search results - page 522 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
INFOCOM
2005
IEEE
15 years 10 months ago
Topology aware overlay networks
— Recently, overlay networks have emerged as a means to enhance end-to-end application performance and availability. Overlay networks attempt to leverage the inherent redundancy ...
Junghee Han, David Watson, Farnam Jahanian
BMCBI
2008
148views more  BMCBI 2008»
15 years 5 months ago
Critical assessment of alignment procedures for LC-MS proteomics and metabolomics measurements
Background: Liquid chromatography coupled to mass spectrometry (LC-MS) has become a prominent tool for the analysis of complex proteomics and metabolomics samples. In many applica...
Eva Lange, Ralf Tautenhahn, Steffen Neumann, Cleme...
DCOSS
2009
Springer
15 years 9 months ago
Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches
Radio Frequency (RF) tomography refers to the process of inferring information about an environment by capturing and analyzing RF signals transmitted between nodes in a wireless se...
Mohammad A. Kanso, Michael G. Rabbat
CIA
2008
Springer
15 years 7 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...