Sciweavers

288 search results - page 6 / 58
» Performance anomaly of 802.11b
Sort
View
ISPASS
2006
IEEE
15 years 3 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
ESWA
2008
172views more  ESWA 2008»
14 years 9 months ago
DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant
DADICC is the abbreviated name for an intelligent system able to detect on-line and diagnose anomalies as soon as possible in the dynamic evolution of the behaviour of a power pla...
Antonio L. Arranz Matía, Alberto Cruz, Migu...
IJNSEC
2008
113views more  IJNSEC 2008»
14 years 9 months ago
An Effective Anomaly Detection Method in SMTP Traffic
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu
ICPPW
2008
IEEE
15 years 4 months ago
Disparity: Scalable Anomaly Detection for Clusters
In this paper, we describe disparity, a tool that does parallel, scalable anomaly detection for clusters. Disparity uses basic statistical methods and scalable reduction operation...
Narayan Desai, Rick Bradshaw, Ewing L. Lusk