Sciweavers

502 search results - page 49 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
CCS
2007
ACM
14 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
SIGCOMM
2012
ACM
11 years 11 months ago
Detecting third-party addresses in traceroute IP paths
Traceroute is probably the most famous computer networks diagnostic tool, widely adopted for both performance troubleshooting and research. Unfortunately, traceroute is not free o...
Pietro Marchetta, Walter de Donato, Antonio Pescap...
CG
2007
Springer
13 years 9 months ago
Visual text mining using association rules
In many situations, individuals or groups of individuals are faced with the need to examine sets of documents to achieve understanding of their structure and to locate relevant in...
Alneu de Andrade Lopes, Roberto Pinho, Fernando Vi...
BMCBI
2010
223views more  BMCBI 2010»
13 years 4 months ago
MetNetGE: interactive views of biological networks and ontologies
Background: Linking high-throughput experimental data with biological networks is a key step for understanding complex biological systems. Currently, visualization tools for large...
Ming Jia, Suh-Yeon Choi, Dirk Reiners, Eve Syrkin ...