Sciweavers

1291 search results - page 60 / 259
» Intrusion Detection for Distributed Applications
Sort
View
116
Voted
RTSS
2009
IEEE
15 years 7 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
MASCOTS
2007
15 years 1 months ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
115
Voted
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 20 days ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
119
Voted
KAIS
2007
120views more  KAIS 2007»
15 years 12 days ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
117
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto