Sciweavers

112 search results - page 7 / 23
» Contribution of Anomalies Detection and Analysis on Traffic ...
Sort
View
TCSV
2008
139views more  TCSV 2008»
13 years 7 months ago
Trajectory-Based Anomalous Event Detection
Abstract--During the last years, the task of automatic event analysis in video sequences has gained an increasing attention among the research community. The application domains ar...
Claudio Piciarelli, Christian Micheloni, Gian Luca...
PEWASUN
2008
ACM
13 years 9 months ago
Source traffic modeling in wireless sensor networks for target tracking
Researches around wireless sensor network (WSN) were very prolific recently. However, traffic modeling related WSN research was poorly less. In this paper, source traffic dynamics...
Qinghua Wang, Tingting Zhang
IPPS
2006
IEEE
14 years 1 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
14 years 2 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash