Sciweavers

772 search results - page 139 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
Named entity recognition from Conversational Telephone Speech leveraging Word Confusion Networks for training and recognition
Named Entity (NE) recognition from the results of Automatic Speech Recognition (ASR) is challenging because of ASR errors. To detect NEs, one of the options is to use a statistica...
Gakuto Kurata, Nobuyasu Itoh, Masafumi Nishimura, ...
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 11 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
GD
2008
Springer
15 years 22 days ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
100
Voted
INFOCOM
2009
IEEE
15 years 6 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
96
Voted
CCS
2007
ACM
15 years 5 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu