Sciweavers

117 search results - page 6 / 24
» Identifying Intrusions in Computer Networks with Principal C...
Sort
View
87
Voted
JSAC
2006
172views more  JSAC 2006»
14 years 9 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
MINENET
2005
ACM
15 years 3 months ago
A first step toward understanding inter-domain routing dynamics
BGP updates are triggered by a variety of events such as link failures, resets, routers crashing, configuration changes, and so on. Making sense of these updates and identifying ...
Kuai Xu, Jaideep Chandrashekar, Zhi-Li Zhang
ICNS
2007
IEEE
15 years 3 months ago
Data fusion algorithms for network anomaly detection: classification and evaluation
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
Vasilis Chatzigiannakis, Georgios Androulidakis, K...
BMCBI
2010
133views more  BMCBI 2010»
14 years 9 months ago
New components of the Dictyostelium PKA pathway revealed by Bayesian analysis of expression data
Background: Identifying candidate genes in genetic networks is important for understanding regulation and biological function. Large gene expression datasets contain relevant info...
Anup Parikh, Eryong Huang, Christopher Dinh, Blaz ...
CVPR
1999
IEEE
15 years 11 months ago
Shape from Recognition and Learning: Recovery of 3-D Face Shapes
In this paper, a novel framework for the recovery of 3D surfaces of faces from single images is developed. The underlying principle is shape from recognition, i.e. the idea that p...
Dibyendu Nandy, Jezekiel Ben-Arie