Sciweavers

1244 search results - page 155 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
IJAHUC
2010
130views more  IJAHUC 2010»
15 years 3 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...
AAAI
2006
15 years 6 months ago
A Bayesian Network for Outbreak Detection and Prediction
Health care officials are increasingly concerned with knowing early whether an outbreak of a particular disease is unfolding. We often have daily counts of some variable that are ...
Xia Jiang, Garrick L. Wallstrom
FAST
2010
15 years 7 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
RAID
2007
Springer
15 years 10 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
ECOI
2010
117views more  ECOI 2010»
15 years 4 months ago
Ensemble extraction for classification and detection of bird species
Advances in technology have enabled new approaches for sensing the environment and collecting data about the world. Once collected, sensor readings can be assembled into data stre...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage