Sciweavers

502 search results - page 60 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
AMDO
2000
Springer
14 years 1 months ago
Analysis of Human Motion Using Snakes and Neural Networks
: A novel technique is described for analysing human movement in outdoor scenes. Following initial detection of the humans using active contour models, the contours are then re-rep...
Ken Tabb, Neil Davey, Rod Adams, Stella J. George
ALGORITHMICA
2008
115views more  ALGORITHMICA 2008»
13 years 9 months ago
Algorithm Engineering for Color-Coding with Applications to Signaling Pathway Detection
Color-coding is a technique to design fixed-parameter algorithms for several NP-complete subgraph isomorphism problems. Somewhat surprisingly, not much work has so far been spent ...
Falk Hüffner, Sebastian Wernicke, Thomas Zich...
ICDCS
2008
IEEE
14 years 3 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
USS
2004
13 years 10 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
CHI
2010
ACM
14 years 3 months ago
Graphemes: self-organizing shape-based clustered structures for network visualisations
Network visualisations use clustering approaches to simplify the presentation of complex graph structures. We present a novel application of clustering algorithms, which controls ...
Ross Shannon, Aaron J. Quigley, Paddy Nixon