Sciweavers

433 search results - page 76 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View

Publication
363views
12 years 7 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong
RAID
2010
Springer
13 years 7 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis
AVSS
2009
IEEE
13 years 6 months ago
Multimodal Abandoned/Removed Object Detection for Low Power Video Surveillance Systems
Low-cost and low-power video surveillance systems based on networks of wireless video sensors will enter soon the marketplace with the promise of flexibility, quick deployment an...
Michele Magno, Federico Tombari, Davide Brunelli, ...
LISA
2000
13 years 10 months ago
Peep (The Network Auralizer): Monitoring Your Network with Sound
Activities in complex networks are often both too important to ignore and too tedious to watch. We created a network monitoring system, Peep, that replaces visual monitoring with ...
Michael Gilfix, Alva L. Couch
CONEXT
2007
ACM
14 years 19 days ago
Can active tracking of inroamer location optimise a live GSM network?
The mobile communication industry has experienced huge growth in recent years, which amplified the competition among telecommunication companies. This inspired the search for new ...
Katerina Dufková, Jirí Danihelka, Mi...