Sciweavers

2236 search results - page 95 / 448
» Intrusion detection techniques and approaches
Sort
View
PVLDB
2010
117views more  PVLDB 2010»
14 years 8 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...
TAOSD
2010
14 years 8 months ago
A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
Selim Ciraci, Wilke Havinga, Mehmet Aksit, Christo...
NDSS
2008
IEEE
15 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
SG
2009
Springer
15 years 4 months ago
GPSel: A Gestural Perceptual-Based Path Selection Technique
This paper introduces a gestural perceptual-based approach to select objects, i.e., nodes and/or edges along paths. Based on known results from perception research, we propose a mo...
Hoda Dehmeshki, Wolfgang Stürzlinger
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
15 years 11 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh