Sciweavers

995 search results - page 30 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
LREC
2008
139views Education» more  LREC 2008»
13 years 8 months ago
Experiments to Investigate the Connection between Case Distribution and Topical Relevance of Search Terms in an Information Retr
We have performed a set of experiments made to investigate the utility of morphological analysis to improve retrieval of documents written in languages with relatively large morph...
Jussi Karlgren, Hercules Dalianis, Bart Jongejan
ISVC
2007
Springer
14 years 1 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
NAR
2007
155views more  NAR 2007»
13 years 7 months ago
Influenza Virus Database (IVDB): an integrated information resource and analysis platform for influenza virus research
Frequent outbreaks of highly pathogenic avian influenza and the increasing data available for comparative analysis require a central database specialized in influenza viruses (IVs...
Suhua Chang, Jiajie Zhang, Xiaoyun Liao, Xinxing Z...
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
14 years 21 days ago
Identifying Transformer Incipient Events for Maintaining Distribution System Reliability
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
Karen L. Butler-Purry, Mustafa Bagriyanik