This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
Most classification methods are based on the assumption that the data conforms to a stationary distribution. However, the real-world data is usually collected over certain periods...
This work addresses the problem of in-the-dark traffic classification for TCP sessions, an important problem in network management. An innovative use of support vector machines (S...
William H. Turkett Jr., Andrew V. Karode, Errin W....
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...