Sciweavers

1244 search results - page 133 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
MOBIHOC
2007
ACM
16 years 4 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
129
Voted
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 4 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
142
Voted
WWW
2007
ACM
16 years 5 months ago
Netprobe: a fast and scalable system for fraud detection in online auction networks
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...
VLDB
2007
ACM
190views Database» more  VLDB 2007»
16 years 4 months ago
Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concur
This paper focuses on the problem of improving distributed query throughput of the RDBMS-based data integration system that has to inherit the query execution model of the underly...
Rubao Lee, Minghong Zhou, Huaming Liao
CISS
2008
IEEE
15 years 11 months ago
Quickest spectrum sensing in cognitive radio
Abstract— Quickest detection is applied to frequency spectrum sensing in cognitive radio systems. Distribution change in frequency domain is detected for vacating secondary radio...
Husheng Li, Chengzhi Li, Huaiyu Dai