Sciweavers

272 search results - page 32 / 55
» A flow based approach for SSH traffic detection
Sort
View
WWW
2005
ACM
14 years 9 months ago
Information flow using edge stress factor
This paper shows how a corpus of instant messages can be employed to detect de facto communities of practice automatically. A novel algorithm based on the concept of Edge Stress F...
Franco Salvetti, Savitha Srinivasan
ICIAP
2001
Springer
14 years 9 months ago
Detecting Objects, Shadows and Ghosts in Video Streams by Exploiting Color and Motion Information
Many approaches to moving object detection for traffic monitoring and video surveillance proposed in the literature are based on background suppression methods. How to correctly a...
Rita Cucchiara, Costantino Grana, Andrea Prati, Ma...
LCN
2005
IEEE
14 years 2 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
ECCV
2008
Springer
14 years 10 months ago
Multi-layered Decomposition of Recurrent Scenes
Abstract. There is considerable interest in techniques capable of identifying anomalies and unusual events in busy outdoor scenes, e.g. road junctions. Many approaches achieve this...
David Mark Russell, Shaogang Gong
SIGCOMM
2004
ACM
14 years 2 months ago
Work-conserving distributed schedulers for Terabit routers
−Buffered multistage interconnection networks offer one of the most scalable and cost-effective approaches to building high capacity routers. Unfortunately, the performance of su...
Prashanth Pappu, Jonathan S. Turner, Kenneth Wong