Sciweavers

502 search results - page 29 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
IJSNET
2007
97views more  IJSNET 2007»
13 years 9 months ago
Stochastic binary sensor networks for noisy environments
— This paper proposes a stochastic framework for detecting anomalies or gathering interesting events in a noisy environment using a sensor network consisting of binary sensors. A...
T. Nguyen, Dong Nguyen, Huaping Liu, Duc A. Tran
CISIM
2008
IEEE
14 years 3 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
TCSV
2008
174views more  TCSV 2008»
13 years 9 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi
ACSAC
2005
IEEE
14 years 2 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
RAID
2005
Springer
14 years 2 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti