Sciweavers

230 search results - page 31 / 46
» A Labeled Data Set for Flow-Based Intrusion Detection
Sort
View
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
14 years 2 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
PAKDD
2004
ACM
94views Data Mining» more  PAKDD 2004»
14 years 29 days ago
Self-Similar Mining of Time Association Rules
Although the task of mining association rules has received considerable attention in the literature, algorithms to find time association rules are often inadequate, by either miss...
Daniel Barbará, Ping Chen, Zohreh Nazeri
GLOBECOM
2008
IEEE
13 years 7 months ago
Highly Memory-Efficient LogLog Hash for Deep Packet Inspection
As the network line rates reach 40 Gbps today and 100 Gbps in the near future, performing deep packet inspection (DPI) in the Network Intrusion Detection and Prevention Systems (NI...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
PCM
2007
Springer
114views Multimedia» more  PCM 2007»
14 years 1 months ago
Random Convolution Ensembles
A novel method for creating diverse ensembles of image classifiers is proposed. The idea is that, for each base image classifier in the ensemble, a random image transformation is g...
Michael Mayo
WWW
2010
ACM
14 years 2 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow