Sciweavers

312 search results - page 31 / 63
» Operational experiences with high-volume network intrusion d...
Sort
View
SAC
2010
ACM
14 years 2 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
IEEECIT
2010
IEEE
13 years 6 months ago
A Rotate-based Best Neighborhood Matching Algorithm for High Definition Image Error Concealment
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
Liqiang He, Yanyan Zhang
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 1 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
PST
2004
13 years 9 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
MCS
2010
Springer
13 years 9 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli