Sciweavers

776 search results - page 65 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
ACSAC
2002
IEEE
15 years 9 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti

Source Code
1763views
17 years 1 months ago
dlib C++ Library
A library for developing portable applications that deal with networking, threads (message passing, futures, etc...), graphical interfaces, complex data structures, linear algebra,...
Davis E. King
ICML
2009
IEEE
16 years 5 months ago
Bayesian clustering for email campaign detection
We discuss the problem of clustering elements according to the sources that have generated them. For elements that are characterized by independent binary attributes, a closedform...
Peter Haider, Tobias Scheffer
147
Voted
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 4 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu