Sciweavers

726 search results - page 5 / 146
» From Anomaly Reports to Cases
Sort
View
TMA
2010
Springer
140views Management» more  TMA 2010»
14 years 9 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
ICDE
2009
IEEE
183views Database» more  ICDE 2009»
14 years 9 months ago
A Decade of XML Data Management: An Industrial Experience Report from Oracle
XML and its related technologies have now been in use for almost a decade. There has been considerable amount of effort both from research and industry focusing on XML, XQuery/XPa...
Zhen Hua Liu, Ravi Murthy
ICSM
2008
IEEE
15 years 6 months ago
Retrieving relevant reports from a customer engagement repository
Customers of modern enterprise applications commonly engage the vendor of the application for onsite troubleshooting and fine tuning of large deployments. The results of these eng...
Dharmesh Thakkar, Zhen Ming Jiang, Ahmed E. Hassan...
RAID
2004
Springer
15 years 5 months ago
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates...
Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhik...
SASN
2003
ACM
15 years 5 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee