Sciweavers

974 search results - page 97 / 195
» Enabling Real Time Data Analysis
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
CISIS
2007
IEEE
14 years 10 months ago
Gridifying IBM's Generic Log Adapter to Speed-Up the Processing of Log Data
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis
HICSS
2000
IEEE
131views Biometrics» more  HICSS 2000»
15 years 2 months ago
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
Michael zur Muehlen, Michael Rosemann
ICPR
2008
IEEE
15 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
DATE
2007
IEEE
223views Hardware» more  DATE 2007»
15 years 4 months ago
CARAT: a toolkit for design and performance analysis of component-based embedded systems
Solid frameworks and toolkits for design and analysis of embedded systems are of high importance, since they enable early reasoning about critical properties of a system. This pap...
Egor R. V. Bondarev, Michel R. V. Chaudron, Peter ...