Sciweavers

141 search results - page 14 / 29
» Real-time Analysis of Flow Data for Network Attack Detection
Sort
View
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 22 days ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 3 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
BPSC
2009
190views Business» more  BPSC 2009»
13 years 9 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
ICDCS
2003
IEEE
14 years 1 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
CIIT
2004
127views Communications» more  CIIT 2004»
13 years 9 months ago
OLSIM: Up-to-date traffic information on the web
The Internet is a convenient platform to distribute real time traffic information. Thus, we propose a web-based visualization of the current and future traffic load of the entire ...
Andreas Pottmeier, Roland Chrobok, Sigurdur F. Haf...