Sciweavers

1402 search results - page 155 / 281
» Detecting Change in Data Streams
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 9 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
TSP
2008
92views more  TSP 2008»
13 years 9 months ago
Quickest Detection and Tracking of Spawning Targets Using Monopulse Radar Channel Signals
Recent advances have been reported in detecting and estimating the location of more than one target within a single monopulse radar beam. Successful tracking of those targets has ...
Atef Isaac, Peter Willett, Yaakov Bar-Shalom
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 9 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 11 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 2 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...