Sciweavers

799 search results - page 60 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IMC
2006
ACM
14 years 1 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
13 years 11 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
INFOCOM
2009
IEEE
14 years 2 months ago
Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach
—Detecting event frontline or boundary sensors in a complex sensor network environment is one of the critical problems for sensor network applications. In this paper, we propose ...
Min Ding, Xiuzhen Cheng
BIBM
2009
IEEE
151views Bioinformatics» more  BIBM 2009»
14 years 2 months ago
Detection of Gene Orthology Based on Protein-Protein Interaction Networks
Abstract—Ortholog detection methods present a powerful approach for finding genes that participate in similar biological processes across different organisms, extending our unde...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...
NCA
2008
IEEE
14 years 2 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck