Sciweavers

502 search results - page 25 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 3 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
CW
2003
IEEE
14 years 2 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
IBERAMIA
2010
Springer
13 years 7 months ago
A Visual Grammar for Face Detection
Several methods have been developed for face detection with certain success, however these tend to fail under difficult conditions such as partial occlusions and changes in orienta...
Augusto Meléndez, Luis Enrique Sucar, Eduar...
WS
2010
ACM
13 years 7 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 10 months ago
Less is More: Compact Matrix Decomposition for Large Sparse Graphs
Given a large sparse graph, how can we find patterns and anomalies? Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, resea...
Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Falo...