Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Parallel and Distributed Computing for Cybersecurity

Published: 01 October 2005 Publication History

Abstract

Parallel and distributed data mining offer great promise for addressing cybersecurity. The Minnesota Intrusion Detection System can detect sophisticated cyberattacks on large-scale networks that are hard to detect using signature-based systems.

Cited By

View all
  • (2023)A Self-Representation Method with Local Similarity Preserving for Fast Multi-View Outlier DetectionACM Transactions on Knowledge Discovery from Data10.1145/353219117:1(1-20)Online publication date: 15-Mar-2023
  • (2021)Ranking Pathology Data in the Absence of a Ground TruthArtificial Intelligence XXXVIII10.1007/978-3-030-91100-3_18(209-223)Online publication date: 14-Dec-2021
  • (2020)European strategy and legislation for cybersecurity: implications for PortugalCluster Computing10.1007/s10586-020-03052-y23:3(1845-1854)Online publication date: 1-Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Distributed Systems Online
IEEE Distributed Systems Online  Volume 6, Issue 10
October 2005

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 October 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Self-Representation Method with Local Similarity Preserving for Fast Multi-View Outlier DetectionACM Transactions on Knowledge Discovery from Data10.1145/353219117:1(1-20)Online publication date: 15-Mar-2023
  • (2021)Ranking Pathology Data in the Absence of a Ground TruthArtificial Intelligence XXXVIII10.1007/978-3-030-91100-3_18(209-223)Online publication date: 14-Dec-2021
  • (2020)European strategy and legislation for cybersecurity: implications for PortugalCluster Computing10.1007/s10586-020-03052-y23:3(1845-1854)Online publication date: 1-Sep-2020
  • (2019)Informing Hybrid System Design in Cyber Security Incident ResponseHCI for Cybersecurity, Privacy and Trust10.1007/978-3-030-22351-9_22(325-338)Online publication date: 26-Jul-2019
  • (2018)Characterization of network behavior to detect changesProceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking10.1145/3170521.3170523(1-6)Online publication date: 4-Jan-2018
  • (2017)Anomaly detection of spectrum in wireless communication via deep auto-encodersThe Journal of Supercomputing10.1007/s11227-017-2017-773:7(3161-3178)Online publication date: 1-Jul-2017
  • (2016)Constant time expected similarity estimation for large-scale anomaly detectionProceedings of the Twenty-second European Conference on Artificial Intelligence10.3233/978-1-61499-672-9-12(12-20)Online publication date: 29-Aug-2016
  • (2016)An MCDM approach towards handling outliers in web dataArtificial Intelligence Review10.1007/s10462-015-9456-446:1(59-82)Online publication date: 1-Jun-2016
  • (2014)Top-k Outlier Detection from Uncertain DataInternational Journal of Automation and Computing10.1007/s11633-014-0775-811:2(128-142)Online publication date: 1-Apr-2014
  • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media