Sciweavers

138 search results - page 25 / 28
» Temporal Signatures for Intrusion Detection
Sort
View
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 8 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
INFOCOM
2007
IEEE
14 years 2 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
DSN
2008
IEEE
14 years 3 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
IPM
2011
118views more  IPM 2011»
13 years 3 months ago
Detecting spam blogs from blog search results
Blogging has been an emerging media for people to express themselves. However, the presence of spam-blogs (also known as splogs) may reduce the value of blogs and blog search engi...
Linhong Zhu, Aixin Sun, Byron Choi
ICIP
2005
IEEE
14 years 10 months ago
Eigenwalks: walk detection and biometrics from symmetry patterns
In this paper we present a symmetry-based approach which can be used to detect humans and to extract biometric characteristics from video image-sequences. The method employs a simp...
Laszlo Havasi, Tamás Szirányi, Zolt&...