Sciweavers

79 search results - page 4 / 16
» Different approaches for the detection of SSH anomalous conn...
Sort
View
IPPS
2010
IEEE
14 years 7 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
MOBIQUITOUS
2007
IEEE
15 years 3 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
CVPR
2007
IEEE
15 years 11 months ago
ROI-SEG: Unsupervised Color Segmentation by Combining Differently Focused Sub Results
This paper presents a novel unsupervised color segmentation scheme named ROI-SEG, which is based on the main idea of combining a set of different sub-segmentation results. We prop...
Michael Donoser, Horst Bischof
MICCAI
2004
Springer
15 years 2 months ago
Detecting Functional Connectivity of the Cerebellum Using Low Frequency Fluctuations (LFFs)
Abstract. So far, resting state functional connectivity (RSFC) has been performed mainly by seed correlation analysis (SCA) on functional MRI (fMRI) studies. In previous studies, t...
Yong He, Yufeng Zang, Tianzi Jiang, Meng Liang, Ga...