• Aucun résultat trouvé

[PDF] Top 20 Contributions on detection and classification of internet traffic anomalies

Has 10000 "Contributions on detection and classification of internet traffic anomalies" found on our website. Below are the top 20 most common "Contributions on detection and classification of internet traffic anomalies".

Contributions on detection and classification of internet traffic anomalies

Contributions on detection and classification of internet traffic anomalies

... effectiveness of NADA was validated in two ways, both with promising ...signatures of network anomalies were compared with the real signatures obtained with the execution of NADA, over real ... Voir le document complet

145

Random Projection and Multiscale Wavelet Leader Based Anomaly Detection and Address Identification in Internet Traffic

Random Projection and Multiscale Wavelet Leader Based Anomaly Detection and Address Identification in Internet Traffic

... benign traffic has a similar appearance to malicious ...Anomaly Classification. Due to the huge volume of traffic data it is not feasible in general, nor here (almost 20,000 sketches were col- ... Voir le document complet

6

Modelling network traffic to detect new anomalies using principals components analysis

Modelling network traffic to detect new anomalies using principals components analysis

... intrusion detection method using a multivariate statistical technique based on principal component analysis (PCA) to detect new anoma- ...day and most of the current intrusion detection ... Voir le document complet

15

Random Projection and Multiscale Wavelet Leader Based Anomaly Detection and Address Identification in Internet Traffic

Random Projection and Multiscale Wavelet Leader Based Anomaly Detection and Address Identification in Internet Traffic

... consists of five IP packet header fields: IP address and port number for source and destination, and IP protocol carried (TCP, UDP or ...flows. traffic, which precludes the use ... Voir le document complet

7

Evaluating the Impact of Traffic Sampling on AATAC's DDoS Detection

Evaluating the Impact of Traffic Sampling on AATAC's DDoS Detection

... accuracy of the detector, we run both implementations over the sampled ...curve of the ...curve of an ideal detector that should detect all anomalies while producing an increasing number ... Voir le document complet

21

Going Beyond DiffServ in IP Traffic Classification

Going Beyond DiffServ in IP Traffic Classification

... Abstract—Quality of Service (QoS) management in IP net- works today relies on static configuration of classes of service definitions and related forwarding ...dynamic classification ... Voir le document complet

7

Detection and localization of link-level network anomalies using end-to-end path monitoring

Detection and localization of link-level network anomalies using end-to-end path monitoring

... set of nodes and E is the set of links interconnecting ...parts of the paper, we express links using the nodes that they ...i and j is denoted as (i, j). Let P be the set of ... Voir le document complet

152

Frequency and phase contributions to the detection of temporal luminance modulation.

Frequency and phase contributions to the detection of temporal luminance modulation.

... control of a Cambridge Research Systems (CRS) VSG/2 color graph- ics card that provides 12 bits of resolution for each phosphor of the 800 × 600 pixel ...rate of 100 Hz, ... Voir le document complet

24

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

... goal of traffic engineering is to reduce the blocking probability, ensuring that a maximal number of requests is accepted in the network; hence it maximizes operator revenues and enhances ... Voir le document complet

7

Performance evaluation of feature selection and tree-based algorithms for traffic classification

Performance evaluation of feature selection and tree-based algorithms for traffic classification

... ML-based traffic classification In [8], two feature selection methods have been used for traffic classification followed by six supervised learning methods (Naive Bayes, Bayes Net, Random ... Voir le document complet

7

Topic Detection and Compressed Classification in Twitter

Topic Detection and Compressed Classification in Twitter

... NY and at Bell Labs, Murray Hill, NJ, USA. gories with the power of Compressive Sensing (CS) by tak- ing advantage of the inherent sparsity of the data, combined with a Kalman filter, as a ... Voir le document complet

6

Enhancing Transparency: Internet Video Quality Inference from Network Traffic

Enhancing Transparency: Internet Video Quality Inference from Network Traffic

... attention of consumers: There is growing literature in behavioral economics to suggest that consumer attention is a scare resource, and the format and method of presentation of ... Voir le document complet

13

Detection and Classification of Acoustic Scenes and Events: Outcome of the DCASE 2016 Challenge

Detection and Classification of Acoustic Scenes and Events: Outcome of the DCASE 2016 Challenge

... scene classification and audio ...formatting and bugs in the submitted code, which are all avoided by requiring submission of system output ...number of submissions for DCASE 2016, ... Voir le document complet

16

Detection and Response to Data Exfiltration from Internet of Things Android Devices

Detection and Response to Data Exfiltration from Internet of Things Android Devices

... picture and media protocols limit the access to Android system ...protocol and media transfer protocol) allow an application running in the computer and requesting connection to the Android device to ... Voir le document complet

16

Contributions to the problems of classification, regression and study of an inverse problem in finance

Contributions to the problems of classification, regression and study of an inverse problem in finance

... problem and brief literature review. As detailed above, if traded puts and calls at a given maturity τ are arbitrage free, they must write as their expected discounted payoff with respect to a single RND q ... Voir le document complet

192

Multiple features extraction and selection for detection and classification of stator winding faults

Multiple features extraction and selection for detection and classification of stator winding faults

... faults and particularly at an unbalanced power supply and noisy condition, the diagnosis of the inter-turn short circuit becomes more ...fault detection performance leads to the appearance ... Voir le document complet

8

Detection and classification of acoustic scenes and events: An IEEE AASP challenge

Detection and classification of acoustic scenes and events: An IEEE AASP challenge

... scene classification, acoustic event detection ...speech and audio processing community in code dissemination and reproducibility of results as a means to improve the quality and ... Voir le document complet

5

Automatic sensor-based detection and classification of climbing activities

Automatic sensor-based detection and classification of climbing activities

... camera and sensors were not synchro- nised, the delay between the frame-based manual an- notations and the acceleration had to be ...position of the red light on the image therefore gave the position ... Voir le document complet

11

From Network Traffic Measurements to QoE for Internet Video

From Network Traffic Measurements to QoE for Internet Video

... video traffic: Inferring QoE related metrics from encrypted traffic of video streaming is a topic of interest in the research community due to the ever growing increase in encrypted video ... Voir le document complet

10

Application of signal analysis techniques to cardiac arrhythmia detection and classification.

Application of signal analysis techniques to cardiac arrhythmia detection and classification.

... In practice, we want our multiple hypothesis testing system to lock onto the correct model as fast as possible, i.e., we wish to achieve the detection and classificati[r] ... Voir le document complet

368

Show all 10000 documents...