Sciweavers

376 search results - page 11 / 76
» Visual Detection of Design Anomalies
Sort
View
ICDIM
2008
IEEE
14 years 2 months ago
NIDS based on payload word frequencies and anomaly of transitions
This paper presents a novel payload analysis method. Consecutive bytes are separated by boundary symbols and defined as words. The frequencies of word appearance and word to word ...
Sasa Mrdovic, Branislava Perunicic
VIZSEC
2005
Springer
14 years 1 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
DIMVA
2010
13 years 5 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
CHI
2010
ACM
14 years 2 months ago
Characterizing debate performance via aggregated twitter sentiment
Television broadcasters are beginning to combine social micro-blogging systems such as Twitter with television to create social video experiences around events. We looked at one s...
Nicholas Diakopoulos, David A. Shamma
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 8 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...