Sciweavers

8177 search results - page 431 / 1636
» Detecting System Emulators
Sort
View
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 5 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
DFN
2009
15 years 5 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
TNN
2008
132views more  TNN 2008»
15 years 4 months ago
Just-in-Time Adaptive Classifiers - Part I: Detecting Nonstationary Changes
Abstract--The stationarity requirement for the process generating the data is a common assumption in classifiers' design. When such hypothesis does not hold, e.g., in applicat...
Cesare Alippi, Manuel Roveri
DC
1998
15 years 4 months ago
Detection of Global Predicates: Techniques and Their Limitations
We show that the problem of predicate detection in distributed systems is NP-complete. In the past, efficient algorithms have been developed for special classes of predicates suc...
Craig M. Chase, Vijay K. Garg
IEEEVAST
2010
14 years 11 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen