Sciweavers

799 search results - page 149 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Network-aware behavior clustering of Internet end hosts
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Kuai Xu, Feng Wang 0002, Lin Gu
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
13 years 8 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
PERCOM
2008
ACM
13 years 7 months ago
The sensor internet at work: Locating everyday items using mobile phones
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically t...
Christian Frank, Philipp Bolliger, Friedemann Matt...
GLOBECOM
2007
IEEE
14 years 2 months ago
A Novel OFDMA Ranging Method Exploiting Multiuser Diversity
This paper addresses initial ranging (uplink synchronization and power control) for TDD OFDMA systems. Exploiting the channel knowledge from the downlink channel together with ini...
Jianqiang Zeng, Hlaing Minn
ISSA
2004
13 years 9 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li