Filters








124,055 Hits in 4.6 sec

Signature-Based Method and Stream Data Mining Technique Performance Evaluation for Security and Intrusion Detection in Advanced Metering Infrastructures (AMI)

Ziaeddin Najafian, Vahe Aghazarian, Alireza Hedayati
2015 International Journal of Computer and Electrical Engineering  
According to the results from this research we can see that the signature-based methods are not useful in IDS systems applied in AMI network.  ...  Amir Faisal et al. in [5], claimed that signature-based intrusion detection systems are not relevant for AMI network.  ...  In fact, using data mining science for exploring knowledge from big data stream is known as a technique in stream data mining.  ... 
doi:10.17706/ijcee.2015.v7.879 fatcat:7nghui5u5vadppf4kc5vhsvzqq

An Efficient Indexing Approach for Continuous Spatial Approximate Keyword Queries over Geo-Textual Streaming Data

Ze Deng, Meng Wang, Lizhe Wang, Xiaohui Huang, Wei Han, Junde Chu, Albert Zomaya
2019 ISPRS International Journal of Geo-Information  
For geo-textual streaming data, the performance issue is more serious since both location information and textual description need to be matched for each incoming streaming data tuple.  ...  Current social-network-based and location-based-service applications need to handle continuous spatial approximate keyword queries over geo-textual streaming data of high density.  ...  The indexing methods for geo-textual data can be roughly classified into two categories, i.e., for static data and streaming data.  ... 
doi:10.3390/ijgi8020057 fatcat:aebnqztq7jc4fglkxyb5ovvc6u

Storage-Efficient Data Prefetching for High Performance Computing [chapter]

Yong Chen, Huaiyu Zhu, Hui Jin, Xian-He Sun
2012 Lecture Notes in Electrical Engineering  
We propose a novel Dynamic Signature Method (DSM) that stores the addresses efficiently to reduce the demand of storage for prefetching.  ...  Experimental results show that the new DSM based prefetcher achieved better performance improvement for over half benchmarks compared to the existing prefetching approaches with the same storage consumption  ...  Similarly, spatial memory streaming was proposed [16] to identify data correlations for commercial workload.  ... 
doi:10.1007/978-94-007-4516-2_11 fatcat:rxglp2rvdjbdbpvpct5evxrmre

Semi-Stream Similarity Join Processing in a Distributed Environment

Hong-Ji Kim, Ki-Hoon Lee
2020 IEEE Access  
Although several studies have been conducted on the similarity join, little attention has been paid to a semi-stream similarity join, which is a similarity join between stream data and a large disk-based  ...  Similarity join has become very important for semi-or un-structured data processing and analysis.  ...  SIGNATURE-BASED SIMILARITY JOIN PROCESSING The state-of-the-art similarity join methods [18] , [36] - [38] are based on signatures, which are a subset of tokens.  ... 
doi:10.1109/access.2020.3009414 fatcat:daez27nvlrfjtot4yekycz7cpm

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN [chapter]

Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
2004 Lecture Notes in Computer Science  
Further on, we describe the general method of publishing and retrieving a stream in p2p CDN.  ...  The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels.  ...  More experiments need to be done for testing its performance.  ... 
doi:10.1007/978-3-540-30191-2_7 fatcat:u36qkjlcwratrclt6hktkhbsje

Anomaly detection on streamed data [article]

Thomas Cochrane and Peter Foster and Terry Lyons and Imanol Perez Arribas
2020 arXiv   pre-print
Applying this method to (signatures) of time series and other types of streamed data we provide an effective methodology of broad applicability for identifying anomalous complex multimodal sequential data  ...  outperforms a state-of-the-art shapelet method for 19 out of 28 data sets.  ...  The authors are grateful for the UEA & UCR time series classification repository [3] , without which it would have been much more difficult to validate our approach.  ... 
arXiv:2006.03487v1 fatcat:7aqdgcmi2rcn3o4ljeamkt7skq

Continental-scale analysis of shallow and deep groundwater contributions to streams

Danielle K Hare, Ashley M Helton, Zachary C Johnson, John W Lane, Martin A Briggs
2021 Nature Communications  
Streams with shallow groundwater signatures account for half of all groundwater signature sites and show reduced baseflow and a higher proportion of warming trends compared to sites with deep groundwater  ...  Streams with atmospheric signatures tend to drain watersheds with low slope and greater human disturbance, indicating reduced stream-groundwater connectivity in populated valley settings.  ...  Koenig for sharing important insight and guidance with method development. We also thank B.L. Kurylyk and H.I. Essaid for their input and advice on the draft manuscript.  ... 
doi:10.1038/s41467-021-21651-0 pmid:33664258 fatcat:necujn7dond2njxoryuqbglodq

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

2018 KSII Transactions on Internet and Information Systems  
Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks.  ...  Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in  ...  Signatures of base trapdoor hash values are computed at offline phase before transmitting stream data.  ... 
doi:10.3837/tiis.2018.06.026 fatcat:i4srnfz53rhsxkz45ngzg3sbma

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream [chapter]

Tieyan Li, Huafei Zhu, Yongdong Wu
2005 Lecture Notes in Computer Science  
In this paper, we propose a multi-source stream authentication (mSSA) framework based on MPEG-4 stream format.  ...  Further on, we utilize advanced cryptographic primitives-aggregate signature schemes, to reduce the signatures' size and improve the performance. We illustrate the scheme and discuss the extensions.  ...  Conclusions and Future Works We proposed the first secure multi-source authentication scheme for composite MPEG-4 stream.  ... 
doi:10.1007/11602897_33 fatcat:ta3433bulnc73aboeklnc3a6yy

Big Data in Intrusion Detection Systems and Intrusion Prevention Systems

Lidong Wang
2017 Journal of Computer Networks  
Big data in intrusion detection systems and Big Data analytics for huge volume of data, heterogeneous features, and real-time stream processing are presented.  ...  This paper introduces network attacks, intrusion detection systems, intrusion prevention systems, and intrusion detection methods including signature-based detection and anomaly-based detection.  ...  Data mining methods for finding evolving clusters and building dynamic classification models in data streams are also necessary for real-time intrusion detection [27] .  ... 
doi:10.12691/jcn-4-1-5 fatcat:rtuuaarlunfnjmktivpxzzw4ea

Autonomous Data Error Detection and Recovery in Streaming Applications

Richard Klockowski, Shigeru Imai, Colin L. Rice, Carlos A. Varela
2013 Procedia Computer Science  
In this paper, we devise a multi-modal data error detection and recovery architecture to enable automated recovery from data errors in streaming applications based on available redundancy.  ...  We formally define error signatures as a way to identify classes of abnormal conditions and mode likelihood vectors as a quantitative discriminator of data stream condition modes.  ...  A method for enforcing logical constraints within streaming applications is presented in [12] .  ... 
doi:10.1016/j.procs.2013.05.373 fatcat:yy7nmiimkvdarlfkmiaglqz754

The Ensemble of Unsupervised Incremental Learning Algorithm for Time Series Data

2022 International Journal of Engineering  
Data stream minin g is a little bit advanced operating on live or stream data. So, existing data mining methods need to be altered to support stream and concept drifts in data streams.  ...  Apart from these methods some of the investigators [6] [7] [8] paid attention and publicized on unsupervised learning for data stream using cluster methods.  ... 
doi:10.5829/ije.2022.35.02b.07 fatcat:uakaucrgkrdohm7e2y2mb3fdga

Multilingual Offline Signature Verification Based on Improved Inverse Discriminator Network

Nurbiya Xamxidin, Mahpirat, Zhixi Yao, Alimjan Aysa, Kurban Ubul
2022 Information  
Acknowledgments: The authors are very thankful to the editor and the referees for their valuable comments and suggestions for improving the paper.  ...  To solve the above problems, this paper establishes an offline handwritten signature of Chinese and Uyghur data sets and proposes an improved offline handwritten signature identification method based on  ...  Method Structure The improved model based on IDN proposed in this paper is shown in Figure 4 .  ... 
doi:10.3390/info13060293 dblp:journals/information/XamxidinMYAU22 fatcat:fvu25xd46vftboqzqch232mgbm

STREAM-BASED WEB SERVICE SECURITY PROCESSING SYSTEM

Vaishali Mangalkar, Prof. R. S. Sonar, Rajesh Yemul
2014 Zenodo  
In this paper we present a solution a stream-based WS-Security processing system, which enables an efficient processing in service computing and increases the robustness against different types of Denial-of-Service  ...  In this paper we present a system for protecting Web Services from Denial-of-Service (DoS) attacks.  ...  of xml signatures and stream-based encryption and decryption of xml documents, which is not sufficient for full ws-security processing integrated into overall soap processing. in this paper, the concepts  ... 
doi:10.5281/zenodo.6886018 fatcat:dvq5at32rbby7aab6g3iq5s2ly

Self-Healing Spatio-temporal Data Streams Using Error Signatures

Shigeru Imai, Richard Klockowski, Carlos A. Varela
2013 2013 IEEE 16th International Conference on Computational Science and Engineering  
Self-healing spatio-temporal data streaming systems enable error detection and data correction based on error signatures.  ...  Error signatures are mathematical function patterns with constraints and are used to identify and categorize errors in redundant spatio-temporal data streams.  ...  of spatio-temporal data streams based on data redundancy.  ... 
doi:10.1109/cse.2013.141 dblp:conf/cse/ImaiKV13 fatcat:adnei4ckbnainjhepabsvpmxi4
« Previous Showing results 1 — 15 out of 124,055 results