Results 1 - 10
of
152
Hypergraph-based anomaly detection of highdimensional co-occurrences
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 2009
"... Abstract—This paper addresses the problem of detecting anomalous multivariate co-occurrences using a limited number of unlabeled training observations. A novel method based on using a hypergraph representation of the data is proposed to deal with this very high-dimensional problem. Hypergraphs const ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Abstract—This paper addresses the problem of detecting anomalous multivariate co-occurrences using a limited number of unlabeled training observations. A novel method based on using a hypergraph representation of the data is proposed to deal with this very high-dimensional problem. Hypergraphs
DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype
- In Proceedings of the 14th National Computer Security Conference
, 1991
"... Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. The proliferation of heterogeneous computer networks provides additional implications for the intrusion detection problem. Namely, the increa ..."
Abstract
-
Cited by 125 (0 self)
- Add to MetaCart
prototype Distributed Intrusion Detection System (DIDS) that combines distributed monitoring and data reduction (through individual host and LAN monitors) with centralized data analysis (through the DIDS director) to monitor a heterogeneous network of computers. This approach is unique among current IDS
Centralized, Measurement-based, Spectrum Management for Environments with Heterogeneous Wireless Networks
"... Abstract—Heterogeneity of wireless networks has become an increasing problem in the wireless spectrum that breaks down spectrum sharing and exacerbates interference. Many coexistence techniques have been proposed to alleviate this interference, however, they are difficult to deploy due to changes ne ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
focused on homogeneous environments. Our approach is a centralized one, where we analyze information collected from heterogeneous monitors available today, structure the information in a hypergraph, and perform an analysis to detect heterogeneous conflicts. Introducing a mixed integer program (in addition
BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks
- IEEE Transactions on Mobile Computing
"... Abstract—The increasing penetration of smart devices with networking capability form novel networks. Such networks, also referred as pocket switched networks (PSNs), are intermittently connected and represent a paradigm shift of forwarding data in an ad hoc manner. The social structure and interacti ..."
Abstract
-
Cited by 60 (0 self)
- Add to MetaCart
. In this paper, we exploit two social and structural metrics, namely centrality and community, using real human mobility traces. The contributions of this paper are two-fold. First, we design and evaluate BUBBLE, a novel social-based forwarding algorithm, that utilizes the aforementioned metrics to enhance
Community Distribution Outlier Detection in Heterogeneous Information Networks
"... Abstract. Heterogeneous networks are ubiquitous. For example, bibliographic data, social data, medical records, movie data and many more can be modeled as heterogeneous networks. Rich information associated with multi-typed nodes in heterogeneous networks motivates us to propose a new definition of ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Abstract. Heterogeneous networks are ubiquitous. For example, bibliographic data, social data, medical records, movie data and many more can be modeled as heterogeneous networks. Rich information associated with multi-typed nodes in heterogeneous networks motivates us to propose a new definition
An Hypergraph Based Approach for Unlocking Power Relations in Rhizomatic Open Source Software Communities
"... Abstract – This study, first, points the rhizomatic nature of open source software (OSS) communities. Then, it proposes an hypergraph based research methodology both to capture and to analyze dynamics of OSS communities. An exemplary hypergraph theoretical analysis of power antecedence within rhizom ..."
Abstract
- Add to MetaCart
Abstract – This study, first, points the rhizomatic nature of open source software (OSS) communities. Then, it proposes an hypergraph based research methodology both to capture and to analyze dynamics of OSS communities. An exemplary hypergraph theoretical analysis of power antecedence within
Density-Based Subspace Clustering in Heterogeneous Networks
"... Abstract. Many real-world data sets, like data from social media or bibliographic data, can be represented as heterogeneous networks with several vertex types. Often additional attributes are available for the vertices, such as keywords for a paper. Clustering vertices in such net-works, and analyzi ..."
Abstract
- Add to MetaCart
the density-based clustering model TCSC for the detection of clusters in heterogeneous networks that are densely con-nected in the network as well as in the attribute space. Unlike previous approaches for clustering heterogeneous networks, TCSC enables the de-tection of clusters that show similarity only in a
SNAM manuscript No. (will be inserted by the editor) Lurking in Social Networks: Topology-based Analysis and Ranking Methods
"... Abstract The massive presence of silent members in online communities, the so-called lurkers, has long at-tracted the attention of researchers in social science, cognitive psychology, and computer-human interaction. However, the study of lurking phenomena represents an unexplored opportunity of rese ..."
Abstract
- Add to MetaCart
centrality methods, including the classic PageRank and alpha-centrality. Empirical evidence has shown the significance of our lurker ranking approach, and its uniqueness in effec-tively identifying and ranking lurkers in an online social network.
A Social Agent-Based Approach to Intrusion Detection Systems
"... Network Intrusion Detection Systems (NIDS) are designed to differentiate malicious traffic from normal traffic on a network system to detect the presence of an attack. Traditionally, the approach around which these systems are designed is based upon an assumption made by Dorothy Denning in 1987 stat ..."
Abstract
- Add to MetaCart
Network Intrusion Detection Systems (NIDS) are designed to differentiate malicious traffic from normal traffic on a network system to detect the presence of an attack. Traditionally, the approach around which these systems are designed is based upon an assumption made by Dorothy Denning in 1987
HG-RANK: A Hypergraph-based Keyphrase Extraction for Short Documents in Dynamic Genre
"... Conventional keyphrase extraction algorithms are applied to a fixed corpus of lengthy documents where keyphrases distinguish documents from each other. However, with the emergence of social networks and microblogs, the nature of such documents has changed. Documents are now of short length and evolv ..."
Abstract
- Add to MetaCart
and social features, as well as discrimina-tive weights for word features respectively, while measuring the centrality of words in the hypergraph. We empirically test the effectiveness of our approach in two different data sets of short documents and show that our approach has an improvement of 14 % to 25
Results 1 - 10
of
152