Sciweavers

1112 search results - page 194 / 223
» On scalable attack detection in the network
Sort
View
FPL
2008
Springer
112views Hardware» more  FPL 2008»
14 years 11 months ago
Secure FPGA configuration architecture preventing system downgrade
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Benoît Badrignans, Reouven Elbaz, Lionel Tor...
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
15 years 3 months ago
Mining Outliers in Spatial Networks
Outlier analysis is an important task in data mining and has attracted much attention in both research and applications. Previous work on outlier detection involves different type...
Wen Jin, Yuelong Jiang, Weining Qian, Anthony K. H...
77
Voted
KAIS
2010
139views more  KAIS 2010»
14 years 8 months ago
Periodic subgraph mining in dynamic networks
In systems of interacting entities such as social networks, interactions that occur regularly typically correspond to significant, yet often infrequent and hard to detect, interact...
Mayank Lahiri, Tanya Y. Berger-Wolf
JSAC
2011
191views more  JSAC 2011»
14 years 4 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
76
Voted
LCN
2008
IEEE
15 years 3 months ago
DiCAP: Distributed Packet Capturing architecture for high-speed network links
— IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge ...
Cristian Morariu, Burkhard Stiller