A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
We present a machine learning approach for the task of ranking previously answered questions in a question repository with respect to their relevance to a new, unanswered referenc...
This paper analyzes the performance of two implementations of J-Flow, the flow measurement tool deployed on most Juniper routers. Our work relies on both controlled experiments an...
Internet data remains one of the basic components of computer science network research. Despite its necessity, available data is limited by legal, social, and technical constraint...
Colleen Shannon, David Moore, Ken Keys, Marina Fom...
We measure the WT10g test collection, used in the TREC-9 and TREC 2001 Web Tracks, and the .GOV test collection used in the TREC 2002 Web and Interactive Tracks, with common measu...