Sciweavers

309 search results - page 34 / 62
» Network Performance Anomaly Detection and Localization
Sort
View
128
Voted
AINA
2004
IEEE
15 years 6 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
98
Voted
DSN
2008
IEEE
15 years 9 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
118
Voted
VIZSEC
2005
Springer
15 years 8 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
174
Voted
CISS
2010
IEEE
14 years 6 months ago
On performance evaluation of cooperative spectrum sensing in cognitive radio networks
—This paper presents the system level performance evaluation for energy-detection based cooperative spectrum sensing in cognitive radio networks. Three performance criteria are q...
Gang Xiong, Shalinee Kishore, Aylin Yener
116
Voted
IWCMC
2006
ACM
15 years 8 months ago
Detecting spatial congestion in multihop wireless networks
While TCP is highly successful in the wire-line Internet, its performance fast degrades as the number of hops increases in multihop wireless networks. It is due to not only the ha...
Changhee Joo, Saewoong Bahk, Hyogon Kim