Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Slit-tear visualizations allow users to selectively visualize pixel paths in a video scene. The slit-tear visualization technique is a generalization of the traditional photograph...
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
The detection of new information in a document stream is an important component of many potential applications. In this work, a new novelty detection approach based on the identif...
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...