Sciweavers

433 search results - page 30 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 5 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
SUTC
2006
IEEE
15 years 5 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
JIIS
2006
113views more  JIIS 2006»
14 years 11 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 5 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
DMS
2010
189views Multimedia» more  DMS 2010»
14 years 9 months ago
Visualizing the Commonalities Between Hierarchically Structured Data Queries
Abstract--In this paper we present an information visualization approach for visualizing the intersection between multiple feature hierarchies. In cases where a dataset has multipl...
Chad Jones, Ryan Armstrong, Kwan-Liu Ma