Sciweavers

49 search results - page 8 / 10
» Anomaly Detection and Mitigation for Disaster Area Networks
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
13 years 7 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
13 years 5 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
FTCS
1993
111views more  FTCS 1993»
13 years 8 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski
LCN
2006
IEEE
14 years 1 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz
TMC
2008
138views more  TMC 2008»
13 years 7 months ago
Airtime Fairness for IEEE 802.11 Multirate Networks
Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min through...
Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dhar...