Sciweavers

543 search results - page 72 / 109
» Detecting anomalies in data streams using statecharts
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CHI
2009
ACM
15 years 10 months ago
Exploring video streams using slit-tear visualizations
Slit-tear visualizations allow users to selectively visualize pixel paths in a video scene. The slit-tear visualization technique is a generalization of the traditional photograph...
Anthony Tang, Saul Greenberg, Sidney Fels
INFOCOM
2012
IEEE
13 years 4 days ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
CIKM
2006
Springer
15 years 1 months ago
Improving novelty detection for general topics using sentence level information patterns
The detection of new information in a document stream is an important component of many potential applications. In this work, a new novelty detection approach based on the identif...
Xiaoyan Li, W. Bruce Croft
FTCS
1993
111views more  FTCS 1993»
14 years 11 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski