Sciweavers

776 search results - page 70 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ICALT
2009
IEEE
15 years 2 months ago
Learning Object Annotation for Agricultural Learning Repositories
This paper introduces a Web-based tool that has been developed to facilitate learning object annotation in agricultural learning repositories with IEEE LOM-compliant metadata. Mor...
Hannes Ebner, Nikos Manouselis, Matthias Palm&eacu...
LCN
2008
IEEE
15 years 10 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
IWIA
2005
IEEE
15 years 10 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
IMC
2010
ACM
15 years 2 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
SECURWARE
2007
IEEE
15 years 10 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate