Sciweavers

186 search results - page 26 / 38
» Online Classification of Network Flows
Sort
View
SIGMETRICS
2008
ACM
143views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Pictures from the Skype
This demo focuses on the online characterization and classification of Skype traffic, a very popular and fashionable VoIP application nowadays. Building over previous work on the ...
Dario Rossi, Silvio Valenti, Paolo Veglia, Dario B...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICMLA
2009
14 years 7 months ago
Alive on Back-feed Culprit Identification via Machine Learning
We describe an application of machine learning techniques toward the problem of predicting which network protector switch is the cause of an Alive on Back-Feed (ABF) event in the ...
Bert C. Huang, Ansaf Salleb-Aouissi, Philip Gross
ICISC
1998
132views Cryptology» more  ICISC 1998»
14 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
77
Voted
FPL
2010
Springer
108views Hardware» more  FPL 2010»
14 years 7 months ago
FPGA Based Network Traffic Analysis Using Traffic Dispersion Patterns
The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. Th...
Faisal Khan, Maya Gokhale, Chen-Nee Chuah