Sciweavers

208 search results - page 8 / 42
» A Visual Approach for Monitoring Logs
Sort
View
IJNSEC
2010
112views more  IJNSEC 2010»
13 years 2 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
WWW
2007
ACM
14 years 8 months ago
Causal relation of queries from temporal logs
In this paper, we study a new problem of mining causal relation of queries in search engine query logs. Causal relation between two queries means event on one query is the causati...
Yizhou Sun, Kunqing Xie, Ning Liu, Shuicheng Yan, ...
OSDI
2008
ACM
14 years 7 months ago
SALSA: Analyzing Logs as StAte Machines
SALSA examines system logs to derive state-machine views of the sytem's execution, along with control-flow, data-flow models and related statistics. Exploiting SALSA's d...
Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gand...
VIZSEC
2005
Springer
14 years 25 days ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
BSN
2006
IEEE
116views Sensor Networks» more  BSN 2006»
14 years 1 months ago
Long-Term Activity Monitoring with a Wearable Sensor Node
This paper introduces an encapsulated sensor node that is devised to monitor and record motion patterns over long, quotidian periods of time with potential application in psycholo...
Kristof Van Laerhoven, Hans-Werner Gellersen, Yann...