Sciweavers

488 search results - page 73 / 98
» Communication Pattern Based Node Selection for Shared Networ...
Sort
View
CCS
2007
ACM
14 years 3 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
ACSAC
2010
IEEE
13 years 15 days ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
AINA
2006
IEEE
14 years 2 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
CIKM
2007
Springer
14 years 3 months ago
Improving the classification of newsgroup messages through social network analysis
Newsgroup participants interact with their communities through conversation threads. They may respond to a message to answer a question, debate a topic, support or disagree with a...
Blaz Fortuna, Eduarda Mendes Rodrigues, Natasa Mil...
GIS
2009
ACM
14 years 21 days ago
Dynamic network data exploration through semi-supervised functional embedding
The paper presents a framework for semi-supervised nonlinear embedding methods useful for exploratory analysis and visualization of spatio-temporal network data. The method provid...
Alexei Pozdnoukhov