The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper deals with the following topics: algorithms; artificial intelligence; bioinformatics; geoinformatics; communication networks; computer architecture; VLSI; computer security; data mining; databases; distributed systems; financial systems; health informatics; image processing; information science; intelligent control systems; Internet; e-commerce; knowledge creation; middleware; mobile computing;...
The authority management is one of the core content in all System, particularly the MIS. The realization of authority management can deal with some problems from the of fundamental, such as misoperation, misdeletion, and other human factors. It can ensure the data management in program all right, and the users of the system work "in place, but not offside." The research use ASP.NET and C#...
At California State University Dominguez Hills, the Computer Science Department has created the "Computer Security Research Lab" (CSRL) to research and analyze ways to improve computer security at the network level. JACED is a program that will improve network and computer security. JACED will use data from sensors and mine the information to improve firewalls and detect new attacks. The...
Problem-Based Learning is a way which centres on students' self-educated learning and questionspsila researching. With the development of the network technology, the learning pattern of the network Problem-Based Learning becomes more and more popular. To build a series of network learning platform of education technology which have powerful function, has put forward some new requirements. The article...
Development and promotion difficulty about network courseware is analyzed, and one kind of curriculum independency network courseware is proposed, Mainly introduced the design mentality and the key technologies when realization. The system may found the network courseware on different curriculum conveniently, and implements the dynamic content management.
Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming - a billion flow records a day for large organizations...
Recently, overlay network is increasingly popular as a means to enhance end-to-end application performance and availability. It is a virtual network constructed over the underlying Internet infrastructure by the end systems(i.e. hosts or servers), and provides some special services. The best predominance is that overlay network can be deployed rapidly, economically and flexibly without changing the...
With the progression of time, we have been blessed with the gifts of science. Computer networks are one of those gifts. But as the network proceeded, intrusions and misuses followed. Consequently, network security has come to the fore front and has become one of the most important issues. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
In this paper, we present a new tree mining algorithm, DryadeParent, based on the hooking principle first introduced in DRYADE. In the experiments, we demonstrate that the branching factor and depth of the frequent patterns to find are key factors of complexity for tree mining algorithms, even if often overlooked in previous work. We show that DryadeParent outperforms the current fastest algorithm,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.