Sciweavers

361 search results - page 47 / 73
» Toward a Query Language for Network Attack Data
Sort
View
IFIP
2010
Springer
13 years 5 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
SAC
2004
ACM
14 years 1 months ago
Integrating similarity-based queries in image DBMSs
Until recently, issues in image retrieval have been handled in DBMSs and in computer vision as separate research works. Nowadays, the trend is towards integrating the two approach...
Solomon Atnafu, Richard Chbeir, David Coquil, Lion...
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
11 years 10 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
ICALP
2000
Springer
13 years 11 months ago
On the Power of Tree-Walking Automata
Abstract. Tree-walking automata (TWAs) recently received new attention in the fields of formal languages and databases. Towards a better understanding of their expressiveness, we c...
Frank Neven, Thomas Schwentick
VLDB
2005
ACM
87views Database» more  VLDB 2005»
14 years 1 months ago
NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems
In this demo, we present Nile-PDT, a Phenomenon Detection and Tracking framework using the Nile data stream management system. A phenomenon is characterized by a group of streams ...
Mohamed H. Ali, Walid G. Aref, Raja Bose, Ahmed K....