Sciweavers

1244 search results - page 152 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
158
Voted
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 8 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
156
Voted
PVLDB
2010
111views more  PVLDB 2010»
14 years 11 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...
166
Voted
ICIP
2004
IEEE
16 years 6 months ago
Online face recognition system for videos based on modified probabilistic neural networks
Video retrieval in consumer applications demands high level semantic descriptors such as people's identity. The problem is that in a variety of videos such as home videos, Ho...
Jun Fan, Nevenka Dimitrova, Vasanth Philomin
152
Voted
ICCS
2003
Springer
15 years 9 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
HOTOS
2003
IEEE
15 years 10 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...