Sciweavers

677 search results - page 82 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
IMC
2005
ACM
14 years 1 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
IADIS
2004
13 years 9 months ago
A note on the distribution of packet arrivals in high-speed data networks
A simple explanation is given of an anomaly often detected in traffic measurement when packet timings are truncated to nearest whole numbers. The correct observed discrete distrib...
Vic Grout, Stuart Cunningham, Denise Oram, Rich He...
CORR
2006
Springer
152views Education» more  CORR 2006»
13 years 7 months ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle
MICCAI
2003
Springer
14 years 8 months ago
Tissue-Based Affine Registration of Brain Images to form a Vascular Density Atlas
Anatomic tissue atlases of the brain are widely used within the medical world and are important for identifying tissue and structural aberrations and inconsistencies within an indi...
Derek Cool, Dini Chillet, Jisung Kim, Jean-Philipp...