Sciweavers

235 search results - page 42 / 47
» Network anomaly detection with incomplete audit data
Sort
View
BPSC
2009
190views Business» more  BPSC 2009»
13 years 8 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
TSP
2010
13 years 2 months ago
On local intrinsic dimension estimation and its applications
In this paper, we present multiple novel applications for local intrinsic dimension estimation. There has been much work done on estimating the global dimension of a data set, typi...
Kevin M. Carter, Raviv Raich, Alfred O. Hero
INFOCOM
2012
IEEE
11 years 10 months ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
IMC
2005
ACM
14 years 1 months ago
Improving Sketch Reconstruction Accuracy Using Linear Least Squares Method
Sketch is a sublinear space data structure that allows one to approximately reconstruct the value associated with any given key in an input data stream. It is the basis for answer...
Gene Moo Lee, Huiya Liu, Young Yoon, Yin Zhang
ICANN
2007
Springer
13 years 11 months ago
Topology Aware Internet Traffic Forecasting Using Neural Networks
Forecasting Internet traffic is receiving an increasing attention from the computer networks domain. Indeed, by improving this task efficient traffic engineering and anomaly detect...
Paulo Cortez, Miguel Rio, Pedro Sousa, Miguel Roch...