Sciweavers

912 search results - page 81 / 183
» Anomaly
Sort
View
ICASSP
2011
IEEE
13 years 18 days ago
Detecting low-rate periodic events in Internet traffic using renewal theory
In our previous work [1, 2] we studied detection of anomalies in packet arrival times for computer networks, most detection of denialof-service (DoS) attacks in Internet traffic....
Sean McPherson, Antonio Ortega
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 4 months ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
MICCAI
2003
Springer
14 years 9 months ago
Tissue-Based Affine Registration of Brain Images to form a Vascular Density Atlas
Anatomic tissue atlases of the brain are widely used within the medical world and are important for identifying tissue and structural aberrations and inconsistencies within an indi...
Derek Cool, Dini Chillet, Jisung Kim, Jean-Philipp...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 9 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 6 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan