Sciweavers

566 search results - page 9 / 114
» Detecting and Identifying Network Anomalies by Component Ana...
Sort
View
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 10 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 10 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
SOCIALCOM
2010
13 years 6 months ago
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and...
Yuhong Liu, Yan (Lindsay) Sun
CIA
2007
Springer
14 years 2 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
BMCBI
2010
100views more  BMCBI 2010»
13 years 8 months ago
Trimming of mammalian transcriptional networks using network component analysis
Background: Network Component Analysis (NCA) has been used to deduce the activities of transcription factors (TFs) from gene expression data and the TF-gene binding relationship. ...
Linh M. Tran, Daniel R. Hyduke, James C. Liao