Sciweavers

142 search results - page 20 / 29
» Statistical Approaches to DDoS Attack Detection and Response
Sort
View
ISBI
2008
IEEE
14 years 8 months ago
Increased sensitivity in FMRI group analysis using mixed-effect modeling
In functional Magnetic Resonance Imaging group studies, uncertainties on the individual BOLD responses are not taken into account by standard detection procedures, which may limit...
Merlin Keller, Alexis Roche
VLDB
2007
ACM
139views Database» more  VLDB 2007»
14 years 2 months ago
A Bayesian Method for Guessing the Extreme Values in a Data Set
For a large number of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smalles...
Mingxi Wu, Chris Jermaine
AAAI
2006
13 years 9 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 8 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
ISBI
2004
IEEE
14 years 8 months ago
Controling The False Positive Detection Rate In Fuzzy Clustering of fMRI Data
Despite its potential advantages for fMRI analysis, fuzzy C-means (FCM) clustering suffers from limitations such as the need for a priori knowledge of the number of clusters, and ...
Hesamoddin Jahanian, Hamid Soltanian-Zadeh, Gholam...