Sciweavers

376 search results - page 4 / 76
» Visual Detection of Design Anomalies
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Network Performance Anomaly Detection and Localization
Abstract—Detecting the occurrence and location of performance anomalies (e.g., high jitter or loss events) is critical to ensuring the effective operation of network infrastructu...
Paul Barford, Nick G. Duffield, Amos Ron, Joel Som...
JIIS
1998
97views more  JIIS 1998»
13 years 7 months ago
Knowledge Mining With VxInsight: Discovery Through Interaction
The explosive growth in the availability of information is overwhelming traditional information management systems. Although individual pieces of information have become easy to ï¬...
George S. Davidson, Bruce Hendrickson, David K. Jo...
CN
2007
168views more  CN 2007»
13 years 7 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
CSDA
2010
124views more  CSDA 2010»
13 years 7 months ago
Statistical inference on attributed random graphs: Fusion of graph features and content
Abstract: Fusion of information from graph features and content can provide superior inference for an anomaly detection task, compared to the corresponding content-only or graph fe...
John Grothendieck, Carey E. Priebe, Allen L. Gorin
ISI
2006
Springer
13 years 7 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...