Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
High availability plays a vital role in the Information Age. Ensuring availability involves the protection against network threats that could lead to unavailability, such as a Distributed Denial of Service (DDoS) attack. Relatively,... more
    • by 
    •   7  
      Network SecurityComputer SecurityCyber SecurityDNS system
Following the success of the First Workshop on the Usage of NetFlow/IPFIX (Pras et al. in J Netw Syst Manag 17(4), 2009) in 2008, the European EMANICS Network of Excellence organized a second workshop in October 2009, held at Jacobs... more
    • by 
    •   4  
      Distributed ComputingNetwork ManagementNetworkNetFlow
ABSTRACTShotgun metagenomics applied to archaeological feces (paleofeces) can bring new insights into the composition and functions of human and animal gut microbiota from the past. However, paleofeces often undergo physical distortions... more
    • by 
    •   9  
      ArchaeologyMachine LearningCoprolite analysisAncient DNA (Archaeology)
ABSTRACTShotgun metagenomics applied to archaeological feces (paleofeces) can bring new insights into the composition and functions of human and animal gut microbiota from the past. However, paleofeces often undergo physical distortions... more
    • by 
    •   11  
      ArchaeologyMachine LearningBiologyCoprolite analysis
    • by 
    •   4  
      MultidisciplinaryEntropyComputer NetworkNetFlow
Big data analysis has become much popular in the present day scenario and the manipulation of big data has gained the keen attention of researchers in the field of data analytics. Analysis of big data is currently considered as an... more
    • by 
    •   6  
      HadoopMapreduceBig DataPig
    • by  and +1
    •   8  
      Computer ScienceMachine LearningComputer NetworksAnalysis
    • by 
    •   5  
      PatternsTechnical ReportFeature ExtractionComputer Network Security
    • by 
    •   8  
      TopologyGravityDPIVectors
The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any... more
    • by 
    •   12  
      Network SecurityAnomaly DetectionNetworkEvent Detection
The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any... more
    • by 
    •   11  
      Network SecurityAnomaly DetectionNetworkEvent Detection
Shotgun metagenomics applied to archaeological feces (paleofeces) can bring new insights into the composition and functions of human and animal gut microbiota from the past. However, paleofeces often undergo physical distortions in... more
    • by 
    •   4  
      Machine LearningCoprolite analysisArcheologyNetFlow
    • by 
    •   4  
      Distributed ComputingNetwork ManagementNetworkNetFlow