Sciweavers

502 search results - page 42 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
VIZSEC
2007
Springer
14 years 3 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
NCA
2008
IEEE
14 years 3 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
IV
2010
IEEE
214views Visualization» more  IV 2010»
13 years 7 months ago
The Network Lens: Interactive Exploration of Multivariate Networks Using Visual Filtering
—Networks are widely used in modeling relational data often comprised of thousands of nodes and edges. This kind of data alone implies a challenge for its visualization as it is ...
Ilir Jusufi, Yang Dingjie, Andreas Kerren
INFOCOM
2012
IEEE
11 years 11 months ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
VLSID
2007
IEEE
126views VLSI» more  VLSID 2007»
14 years 9 months ago
An ECO Technique for Removing Crosstalk Violations in Clock Networks
Crosstalk noise in the clock network of digital circuits is often detected late in the design cycle, sometimes as late as after first silicon. It is therefore necessary to fix cros...
Amit Kumar, Krishnendu Chakrabarty, Chunduri Rama ...