Sciweavers

8177 search results - page 59 / 1636
» Detecting System Emulators
Sort
View
ECIR
2008
Springer
13 years 10 months ago
A Comparison of Named Entity Patterns from a User Analysis and a System Analysis
This paper investigates the detection of named entity (NE) patterns by comparing the results of NE patterns resulting from a user analysis and a system analysis. Findings revealed ...
Masnizah Mohd, Fabio Crestani, Ian Ruthven
KIVS
2007
Springer
14 years 3 months ago
A System for in-Network Anomaly Detection
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
Thomas Gamer
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
14 years 2 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
SIGMOD
2007
ACM
190views Database» more  SIGMOD 2007»
14 years 9 months ago
XANADUE: a system for detecting changes to XML data in tree-unaware relational databases
Recently, a number of main memory algorithms for detecting the changes to XML data have been proposed. These approaches are not suitable for detecting changes to large XML documen...
Erwin Leonardi, Sourav S. Bhowmick
ACMSE
2004
ACM
14 years 2 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart