Sciweavers

198 search results - page 24 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
15 years 9 months ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
137
Voted
IMC
2010
ACM
15 years 1 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
IPSN
2005
Springer
15 years 9 months ago
Sensing capacity for discrete sensor network applications
We bound the number of sensors required to achieve a desired level of sensing accuracy in a discrete sensor network application (e.g. distributed detection). We model the state of...
Yaron Rachlin, Rohit Negi, Pradeep K. Khosla
CCS
2009
ACM
15 years 10 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
103
Voted
SSD
2005
Springer
153views Database» more  SSD 2005»
15 years 9 months ago
Change Detection in Time Series Data Using Wavelet Footprints
In this paper, we propose a novel approach to address the problem of change detection in time series data. Our approach is based on wavelet footprints proposed originally by the si...
Mehdi Sharifzadeh, Farnaz Azmoodeh, Cyrus Shahabi