Sciweavers

6812 search results - page 105 / 1363
» Detection of Information Flows
Sort
View
JPDC
2006
253views more  JPDC 2006»
15 years 1 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
ICCS
2003
Springer
15 years 6 months ago
Trajectory Mapping for Landmine Detection Training
A head-mounted camera is a useful tool for studying the usability of mobile devices in the field. In this paper, a computerized visualization method is presented. It includes the t...
Yang Cai 0002
TOG
2002
208views more  TOG 2002»
15 years 1 months ago
Video matting of complex scenes
This paper describes a new framework for video matting, the process of pulling a high-quality alpha matte and foreground from a video sequence. The framework builds upon technique...
Yung-Yu Chuang, Aseem Agarwala, Brian Curless, Dav...
FPL
2004
Springer
141views Hardware» more  FPL 2004»
15 years 7 months ago
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs
—This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and...
Zachary K. Baker, Viktor K. Prasanna
103
Voted
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 8 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...