Sciweavers

1921 search results - page 216 / 385
» Learning from sensor network data
Sort
View
123
Voted
IDEAL
2010
Springer
15 years 1 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
133
Voted
DSN
2005
IEEE
15 years 8 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
116
Voted
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
15 years 4 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
123
Voted
IPSN
2010
Springer
15 years 9 months ago
Diagnostic powertracing for sensor node failure analysis
Troubleshooting unresponsive sensor nodes is a significant challenge in remote sensor network deployments. This paper introduces the tele-diagnostic powertracer, an in-situ troub...
Mohammad Maifi Hasan Khan, Hieu Khac Le, Michael L...
110
Voted
EVOW
2008
Springer
15 years 4 months ago
Learning Gaussian Graphical Models of Gene Networks with False Discovery Rate Control
In many cases what matters is not whether a false discovery is made or not but the expected proportion of false discoveries among all the discoveries made, i.e. the so-called false...
Jose M. Peña