Sciweavers

765 search results - page 41 / 153
» Detecting Anomalies and Intruders
Sort
View
APNOMS
2006
Springer
15 years 1 months ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka
MASCOTS
2010
14 years 11 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
ICPR
2006
IEEE
15 years 10 months ago
Anomaly Detection for Video Surveillance Applications
We investigate the problem of anomaly detection for video surveillance applications. In our approach, we use a compression-based similarity measure to determine similarity between...
Carmen E. Au, James J. Clark, Sandra Skaff
WISTP
2010
Springer
15 years 4 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
GRID
2007
Springer
15 years 3 months ago
Log summarization and anomaly detection for troubleshooting distributed systems
— Today’s system monitoring tools are capable of detecting system failures such as host failures, OS errors, and network partitions in near-real time. Unfortunately, the same c...
Dan Gunter, Brian Tierney, Aaron Brown, D. Martin ...