Sciweavers

7544 search results - page 80 / 1509
» Network Forensics Analysis
Sort
View
CN
1999
128views more  CN 1999»
14 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
CSE
2009
IEEE
15 years 4 months ago
Web Science 2.0: Identifying Trends through Semantic Social Network Analysis
—We introduce a novel set of social network analysis based algorithms for mining the Web, blogs, and online forums to identify trends and find the people launching these new tren...
Peter A. Gloor, Jonas Krauss, Stefan Nann, Kai Fis...
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
15 years 3 months ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...
ICDAR
2003
IEEE
15 years 3 months ago
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis
Neural networks are a powerful technology for classification of visual inputs arising from documents. However, there is a confusing plethora of different neural network methods th...
Patrice Simard, David Steinkraus, John C. Platt
ASUNAM
2009
IEEE
15 years 4 months ago
Social Network Discovery Based on Sensitivity Analysis
—This paper presents a novel methodology for social network discovery based on the sensitivity coefficients of importance metrics, namely the Markov centrality of a node, a metr...
Tarik Crnovrsanin, Carlos D. Correa, Kwan-Liu Ma