Sciweavers

2269 search results - page 376 / 454
» Behavioral Intrusion Detection
Sort
View
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
14 years 4 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
INFOCOM
2005
IEEE
14 years 3 months ago
Spatial-temporal analysis of passive TCP measurements
— In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The fo...
Eli Brosh, G. Lubetzky-Sharon, Yuval Shavitt
INFOCOM
2005
IEEE
14 years 3 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
PG
2003
IEEE
14 years 3 months ago
Adaptive Grouping and Subdivision for Simulating Hair Dynamics
We present a novel approach for adaptively grouping and subdividing hair using discrete level-of-detail (LOD) representations. The set of discrete LODs include hair strands, clust...
Kelly Ward, Ming C. Lin
ICVS
2003
Springer
14 years 3 months ago
Trajectory Based Assessment of Coordinated Human Activity
Most approaches to detection and classification of human activity deal with observing individual persons. However, people often tend to organize into groups to achieve certain goa...
Marko Jug, Janez Pers, Branko Dezman, Stanislav Ko...