Sciweavers

765 search results - page 134 / 153
» Detecting Anomalies and Intruders
Sort
View
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
14 years 1 months ago
Causal Reasoning Engine: An Explanation-Based Approach to Syndromic Surveillance
1 Quickly detecting an unexpected pathogen can save many lives. In cases of bioterrorism or naturally occurring epidemics, accurate diagnoses may not be made until much of the popu...
Benjamin B. Perry, Tim Van Allen
INFOCOM
2005
IEEE
14 years 1 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 28 days ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
ISMIS
2005
Springer
14 years 27 days ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
IH
2001
Springer
13 years 12 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar