Sciweavers

31 search results - page 6 / 7
» Detecting Network Anomalies Using CUSUM and EM Clustering
Sort
View
91
Voted
ICNS
2007
IEEE
15 years 3 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
TSP
2010
14 years 4 months ago
On local intrinsic dimension estimation and its applications
In this paper, we present multiple novel applications for local intrinsic dimension estimation. There has been much work done on estimating the global dimension of a data set, typi...
Kevin M. Carter, Raviv Raich, Alfred O. Hero
ICDM
2007
IEEE
196views Data Mining» more  ICDM 2007»
15 years 3 months ago
Diagnosing Similarity of Oscillation Trends in Time Series
Sensor networks have increased the amount and variety of temporal data available, requiring the definition of new techniques for data mining. Related research typically addresses...
Leonardo E. Mariote, Claudia Bauzer Medeiros, Rica...
IMC
2007
ACM
14 years 11 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
15 years 10 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu