Bayesian Image Segmentations By Potts Prior And Loopy Belief Propagation | 1 | 0.43 | 2014 |
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy. | 2 | 0.43 | 2012 |
Composite Likelihood Estimation for Restricted Boltzmann machines. | 0 | 0.34 | 2012 |
Development of a WLAN based monitoring system for group activity measurement in real-time. | 2 | 0.50 | 2011 |
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages | 3 | 0.48 | 2009 |
Combating against internet worms in large-scale networks: an autonomic signature-based solution | 10 | 0.65 | 2009 |
Detecting DRDoS attacks by a simple response packet confirmation mechanism | 13 | 0.77 | 2008 |
A Reliable Network Identification Method Based on Transition Pattern of Payload Length | 0 | 0.34 | 2008 |
Discrimination of similar characters with a nonlinear compound discriminant function | 1 | 0.41 | 2007 |
A Multi-Level Security Based Autonomic Parameter Selection Approach For An Effective And Early Detection Of Internet Worms | 0 | 0.34 | 2006 |
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures | 2 | 0.39 | 2005 |
A new network anomaly detection technique based on per-flow and per-service statistics | 1 | 0.37 | 2005 |
Detecting And Tracing Ddos Attacks In The Traffic Analysis Using Auto Regressive Model | 2 | 0.41 | 2004 |