Sciweavers

935 search results - page 115 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
USS
2008
14 years 14 days ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 10 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
WDAG
1998
Springer
107views Algorithms» more  WDAG 1998»
14 years 2 months ago
Transient Fault Detectors
We present fault detectors for transient faults, (i.e. corruptions of the memory of the processors, but not of the code of the processors). We distinguish fault detectors for tasks...
Joffroy Beauquier, Sylvie Delaët, Shlomi Dole...
MM
1998
ACM
150views Multimedia» more  MM 1998»
14 years 2 months ago
Zodiac: A History-Based Interactive Video Authoring System
Easy-to-use audio/video authoring tools play a crucial role in moving multimedia software from research curiosity to mainstream applications. However, research in multimedia author...
Tzi-cker Chiueh, Tulika Mitra, Anindya Neogi, Chua...
ICNP
2006
IEEE
14 years 4 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...