Sciweavers

433 search results - page 67 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 10 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
SIGCOMM
2009
ACM
15 years 7 months ago
Towards automated performance diagnosis in a large IPTV network
IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers. Compared with traditional ISP networks, an IPTV distribution network (i...
Ajay Anil Mahimkar, Zihui Ge, Aman Shaikh, Jia Wan...
RAID
2001
Springer
15 years 5 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
AVI
2006
15 years 2 months ago
Implicit brushing and target snapping: data exploration and sense-making on large displays
During grouping tasks for data exploration and sense-making, the criteria are normally not well-defined. When users are bringing together data objects thought to be similar in som...
Xiaohua Sun, Patrick Chiu, Jeffrey Huang, Maribeth...
139
Voted
IJMMS
2007
166views more  IJMMS 2007»
15 years 20 days ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...