Sciweavers

420 search results - page 68 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
SECURWARE
2008
IEEE
14 years 3 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
PAMI
2010
218views more  PAMI 2010»
13 years 3 months ago
A Coupled Duration-Focused Architecture for Real-Time Music-to-Score Alignment
Abstract--The capacity for realtime synchronization and coordination is a common ability among trained musicians performing a music score that presents an interesting challenge for...
Arshia Cont
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 8 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
CGA
2005
13 years 8 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...
JMLR
2010
185views more  JMLR 2010»
13 years 3 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto