Sciweavers

272 search results - page 29 / 55
» A flow based approach for SSH traffic detection
Sort
View
FLAIRS
2010
13 years 11 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
DSN
2009
IEEE
14 years 3 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...
CSREASAM
2006
13 years 10 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
COMPSAC
2009
IEEE
14 years 3 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
ISQED
2007
IEEE
109views Hardware» more  ISQED 2007»
14 years 3 months ago
Virtual Channels Planning for Networks-on-Chip
The virtual channel flow control (VCFC) provides an efficient implementation for on-chip networks. However, allocating the virtual channels (VCs) uniformly results in a waste of a...
Ting-Chun Huang, Ümit Y. Ogras, Radu Marcules...