Systems and methods of discovering and traversing coexisting topologies

DB Avery, RE Perkowski, L Szumel… - US Patent …, 2020 - Google Patents
A method comprising: receiving from a third party virtualization platform: virtual machine
manager identifiers identifying virtual machine managers, hypervisor identifiers identifying …

System and method of flow source discovery

N York, R Lee, V Neema, X Pan - US Patent 10,768,970, 2020 - Google Patents
An example method comprises receiving flow packets from network traffic analyzing
platforms, for each particular flow packet: identify the particular flow packet as belonging to …

Protocol misbehavior mitigation framework for broadcast communications in vehicular ad hoc networks

K Sharshembiev - 2019 - louis.uah.edu
Abstract Vehicular Ad Hoc Networks (VANET) have a great potential to become the next
technological paradigm shift to enable Intelligent Transportation Systems (ITS). Over the …

Performance issues on integration of security services

FD Pereira, ED Moreno - … on Computational Science XI: Special Issue on …, 2010 - Springer
The integration of security services is an important solution to combat anomalies and attacks
on computer systems, assuming that possible difficulties of a security service may be …

[PDF][PDF] Network Anomaly Detection Method in combination with Intelligent Sampling

AR Batta, V Joginipelli, PS Kudaravalli - cs.gmu.edu
This paper presents research in the area of improving Network Anomaly Detection
effectiveness by using Network Anomaly Detection Methods in combination with Intelligent …

[引用][C] Flow Sampling for Network Intrusion Detection–An Acceptance Sampling Approach

C Madhusudhanarao, MM Naidu - International Journal of Applied Engineering …, 2018

[引用][C] Improving accuracy for anomaly based IDS using signature based system

N Ugtakhbayar, B Usukhbayar… - International Journal of …, 2016 - LJS Publishing

[引用][C] Flow-based anomaly detection in high-speed networks

Z Jadidi - 2015