Sciweavers

104 search results - page 18 / 21
» A Comparative Study of Anomaly Detection Schemes in Network ...
Sort
View
LCN
2007
IEEE
14 years 1 months ago
Efficient Multi-Dimensional Flow Correlation
—Flow correlation algorithms compare flows to determine similarity, and are especially useful and well studied for detecting flow chains through “stepping stone” hosts. Most ...
W. Timothy Strayer, Christine E. Jones, Beverly Sc...
ACMSE
2005
ACM
13 years 9 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
GLOBECOM
2010
IEEE
13 years 4 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
14 years 1 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
INFOCOM
2010
IEEE
13 years 5 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao