Sciweavers

288 search results - page 3 / 58
» Performance anomaly of 802.11b
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
AINA
2007
IEEE
14 years 1 months ago
On the Contribution of Preamble to Information Hiding in Mimicry Attacks
In this paper, we aim to determine the significance of different stages of an attack, namely the preamble and the exploit, on an achieved anomaly rate. To this end, we analyze fou...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
DSN
2005
IEEE
14 years 22 days ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
COLING
2008
13 years 8 months ago
Anomalies in the WordNet Verb Hierarchy
The WordNet verb hierarchy is tested, with a view to improving the performance of its applications, revealing topological anomalies and casting doubt on its semantic categories. E...
Tom Richens
ISMIS
2005
Springer
14 years 18 days ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...