Sciweavers

288 search results - page 11 / 58
» Performance anomaly of 802.11b
Sort
View
ICARIS
2005
Springer
15 years 3 months ago
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed t...
Thomas Stibor, Jonathan Timmis, Claudia Eckert
JSS
2008
113views more  JSS 2008»
14 years 9 months ago
A model for software rework reduction through a combination of anomaly metrics
Analysis of anomalies reported during testing of a project can tell a lot about how well the processes and products work. Still, organizations rarely use anomaly reports for more t...
Lars-Ola Damm, Lars Lundberg, Claes Wohlin
JMLR
2010
198views more  JMLR 2010»
14 years 4 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
81
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
MOBISYS
2006
ACM
15 years 9 months ago
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs
Deployments of wireless LANs consisting of hundreds of 802.11 access points with a large number of users have been reported in enterprises as well as college campuses. However, du...
Anmol Sheth, Christian Doerr, Dirk Grunwald, Richa...