Sciweavers

776 search results - page 74 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
16 years 5 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
ICML
1996
IEEE
16 years 5 months ago
Learning Goal Oriented Bayesian Networks for Telecommunications Risk Management
This paper discusses issues related to Bayesian network model learning for unbalanced binary classification tasks. In general, the primary focus of current research on Bayesian ne...
Kazuo J. Ezawa, Moninder Singh, Steven W. Norton
ECTEL
2007
Springer
15 years 10 months ago
ICT Supported Interorganizational Knowledge-Creation: Application of Change Laboratory
To answer the challenges of globally distributed organizations facing constant transformation of work, means of ICT supported interorganizational knowledge-creation is needed. Firs...
Seppo Toikka
IPPS
2009
IEEE
15 years 11 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos