Sciweavers

4345 search results - page 109 / 869
» Temporal Constraint Networks
Sort
View
202
Voted
RAID
1999
Springer
15 years 8 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
APNOMS
2006
Springer
15 years 8 months ago
Temporal Patterns and Properties in Multiple-Flow Interactions
It is widely recognized that today's Internet traffic is mostly carried by a relatively small number of elephant flows while mice flows constitute up to 80% of all active flow...
Marat Zhanikeev, Yoshiaki Tanaka
GLOBECOM
2008
IEEE
15 years 11 months ago
Inferring Internet Worm Temporal Characteristics
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
DMSN
2007
ACM
15 years 8 months ago
Declarative temporal data models for sensor-driven query processing
Many sensor network applications monitor continuous phenomena by sampling, and fit time-varying models that capture the phenomena's behaviors. We introduce Pulse, a framework...
Yanif Ahmad, Ugur Çetintemel
CP
2006
Springer
15 years 8 months ago
Towards an Efficient SAT Encoding for Temporal Reasoning
Abstract. In this paper, we investigate how an IA network can be effectively encoded into the SAT domain. We propose two basic approaches to modelling an IA network as a CSP: one r...
Duc Nghia Pham, John Thornton, Abdul Sattar