-
Chapter and Conference Paper
Using a Neural Network to Detect Anomalies Given an N-gram Profile
In order to detect unknown intrusions and runtime errors of computer programs, the cyber-security community has developed various detection techniques. Anomaly detection is an approach that is designed to prof...
-
Article
Open AccessA survey of cloud-based network intrusion detection analysis
As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine l...
-
Article
Open AccessDesigning a collaborative visual analytics system to support users’ continuous analytical processes
In recent, numerous useful visual analytics tools have been designed to help domain experts solve analytical problems. However, most of the tools do not reflect the nature of solving real-world analytical task...
-
Chapter and Conference Paper
A Bigtable/MapReduce-Based Cloud Infrastructure for Effectively and Efficiently Managing Large-Scale Sensor Networks
This paper proposes a novel approach for effectively and efficiently managing large-scale sensor networks defining a Cloud infrastructure that makes use of Bigtable at the data layer and MapReduce at the processi...
-
Chapter and Conference Paper
MBR Models for Uncertainty Regions of Moving Objects
The increase in the advanced location based services such as traffic coordination and management necessitates the need for advanced models tracking the positions of Moving Objects (MOs) like vehicles. Computers c...
-
Chapter and Conference Paper
The Tornado Model: Uncertainty Model for Continuously Changing Data
To support emerging database applications that deal with continuously changing (or moving) data objects (CCDOs), such as vehicles, RFIDs, and multi-stimuli sensors, one requires an efficient data management sy...
-
Chapter and Conference Paper
Interpolating and Using Most Likely Trajectories in Moving-Objects Databases
In recent years, many emerging database applications deal with large sets of continuously moving data objects. Since no computer system can commit continuously occurring infinitesimal changes to the database, ...
-
Chapter and Conference Paper
An Efficient Zoning Technique for Multi-dimensional Access Methods
In emerging database applications that deal with large sets of multidimensional data, the performance of the query system significantly depends on the performance of its access methods and the underlying disk ...
-
Chapter and Conference Paper
Adaptive Query Processing in Point-Transformation Schemes
Point-transformation schemes transform multidimensional points to one-dimensional values so that conventional access methods can be used to index multidimensional points, enabling convenient integration of mul...
-
Chapter and Conference Paper
Dynamic Splitting Policies of the Adaptive 3DR-Tree for Indexing Continuously Moving Objects
Moving-objects databases need a spatio-temporal indexing scheme for moving objects to efficiently process queries over continuously changing locations of the objects. A simple extension of the R-tree that empl...