Sciweavers

433 search results - page 53 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
CCS
2004
ACM
14 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
SAC
2010
ACM
14 years 3 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
WS
2003
ACM
14 years 2 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
PKDD
2009
Springer
113views Data Mining» more  PKDD 2009»
14 years 3 months ago
Feature Selection for Density Level-Sets
A frequent problem in density level-set estimation is the choice of the right features that give rise to compact and concise representations of the observed data. We present an eï¬...
Marius Kloft, Shinichi Nakajima, Ulf Brefeld
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
14 years 9 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han