Sciweavers

502 search results - page 69 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ICDCS
2007
IEEE
14 years 3 months ago
Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks
Effective mechanisms for detecting and thwarting Distributed Denial-of-Service (DDoS) attacks are becoming increasingly important to the success of today’s Internet as a viable ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
SIGMOD
2008
ACM
245views Database» more  SIGMOD 2008»
14 years 9 months ago
Information fusion in wireless sensor networks
In wireless sensor networks (WSNs), energy consumption and data quality are two important issues due to limited energy resources and the need for accurate data. In this scenario, i...
Eduardo Freire Nakamura, Antonio Alfredo Ferreira ...
RAID
2010
Springer
13 years 7 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
MM
2005
ACM
167views Multimedia» more  MM 2005»
14 years 2 months ago
SensEye: a multi-tier camera sensor network
This paper argues that a camera sensor network containing heterogeneous elements provides numerous benefits over traditional homogeneous sensor networks. We present the design an...
Purushottam Kulkarni, Deepak Ganesan, Prashant J. ...
VISUALIZATION
1992
IEEE
14 years 1 months ago
Display of Scientific Data Structures for Algorithm Visualization
algorithms as networks of modules. The data flow architecture is popular because of the flexibility of mixing calculation modules with display modules, and because of its easy grap...
William L. Hibbard, Charles R. Dyer, Brian E. Paul