|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 768 occurrences of 518 keywords
|
|
|
Results
Found 968 publication records. Showing 968 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
123 | Yungbum Jung, Jaehwang Kim, Jaeho Shin 0001, Kwangkeun Yi |
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005, Proceedings, pp. 203-217, 2005, Springer, 3-540-28584-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
102 | Yuval Bitan, Joachim Meyer 0002, David Shinar, Ehud Zmora |
Nurses' reactions to alarms in a neonatal intensive care unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 6(4), pp. 239-246, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Scheduling strategic behavior, Alarms, Intensive care |
88 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 234-244, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
79 | Safaa O. Al-Mamory, Hongli Zhang 0001, Ayad R. Abbas |
IDS alarms reduction using data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 3564-3570, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Klaus Julisch |
Clustering intrusion detection alarms to support root cause analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 443-471, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data mining, Intrusion detection, cluster analysis, false positives, root cause analysis |
67 | Kulsoom Abdullah, Christopher P. Lee 0001, Gregory J. Conti, John A. Copeland, John T. Stasko |
IDS RainStorm: Visualizing IDS Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 1, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IDS alarms, alert visualization, log visualization, alarm visualization, network security information visualization, network monitoring |
61 | Abdulrahman Alharby, Hideki Imai |
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 192-205, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
alarm reduction, Intrusion detection, sequential patterns |
61 | Jeffrey B. Colombe, Gregory Stephens |
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 138-142, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, information visualization, anomaly detection, cognitive load |
53 | Maya Shehab, Nashat Mansour, Ahmad Faour |
Growing Hierarchical Self-Organizing Map for Filtering Intrusion Detection Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 9th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2008, 7-9 May 2008, Sydney, NSW, Australia, pp. 167-172, 2008, IEEE Computer Society, 978-0-7695-3125-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alarm filtering, growing hierarchical self-organizing map, intrusion detection, self-organizing map, computer security |
53 | Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 139-150, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
True positive, DARPA dataset, Intrusion Detection System, False positive, Snort |
53 | Xavier Rival |
Understanding the Origin of Alarms in Astrée. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005, Proceedings, pp. 303-319, 2005, Springer, 3-540-28584-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Klaus Julisch, Marc Dacier |
Mining intrusion detection alarms for actionable knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 366-375, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
alarm investigation, episode rules, data mining, intrusion detection, conceptual clustering |
49 | Rebecca Randell |
Accountability in an alarming environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, CSCW 2004, Chicago, Illinois, USA, November 6-10, 2004, pp. 125-131, 2004, ACM, 1-58113-810-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
customisable technologies, medical technologies, ethnography, accountability, customisation, alarms |
44 | Daniele Rossi 0001, Martin Omaña 0001, Cecilia Metra |
Checkers' No-Harm Alarms and Design Approaches to Tolerate Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 24(1-3), pp. 93-103, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Error detecting codes, Transient faults, Self-checking circuits, Checker |
44 | Bhuvan Bamba, Ling Liu 0001, Philip S. Yu, Gong Zhang 0008, Myungcheol Doo |
Scalable Processing of Spatial Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2008, 15th International Conference, Bangalore, India, December 17-20, 2008. Proceedings, pp. 232-244, 2008, Springer, 978-3-540-89893-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Sizu Hou, Xianfei Zhang |
Alarms Association Rules Based on Sequential Pattern Mining Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (2) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 2, pp. 556-560, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Nathan Lau |
A signal processing approach to auditory alarm design and evaluation: An analysis of melodic medical equipment alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 2606-2612, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Zhenwei Yu 0001, Jeffrey J. P. Tsai, Thomas J. Weigert |
An adaptive automatically tuning intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 3(3), pp. 10:1-10:25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Fuzzy control |
44 | Frédéric Massicotte, Yvan Labiche, Lionel C. Briand |
Toward Automatic Generation of Intrusion Detection Verification Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 279-288, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | James J. Treinen, Ramakrishna Thurimella |
Application of the PageRank Algorithm to Alarm Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 480-494, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Watch Lists, Alarm Graphs, Intrusion Detection, PageRank, Security Visualization |
44 | Yangyang Wu, Shuguang Du, Wei Luo |
Mining Alarm Database of Telecommunication Network for Alarm Association Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China, pp. 281-286, 2005, IEEE Computer Society, 0-7695-2492-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yan Xiao 0001, F. Jacob Seagull, Fe Nieves-Khouw, Nancy Barczak, Sherry Perkins |
Organizational-historical analysis of the "failure to respond to alarm" problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 34(6), pp. 772-778, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Kaustav Das, Andrew W. Moore 0001, Jeff G. Schneider |
Belief state approaches to signaling alarms in surveillance systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 539-544, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
scan statistic, signaling alarms, probabilistic model, surveillance systems |
36 | Mohammed Al-Kharaz, Bouchra Ananou, Mustapha Ouladsine, Michel Combal, Jacques Pinaton |
Indicator of Alarm Risk on Product Degradation, Prediction for Alarms Grouping, Using Alarms Data in Semiconductor Manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 58th IEEE Conference on Decision and Control, CDC 2019, Nice, France, December 11-13, 2019, pp. 4741-4746, 2019, IEEE, 978-1-7281-1398-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Sandip Kundu, Ilia Polian |
An Improved Technique for Reducing False Alarms Due to Soft Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 12th IEEE International On-Line Testing Symposium (IOLTS 2006), 10-12 July 2006, Como, Italy, pp. 105-110, 2006, IEEE Computer Society, 0-7695-2620-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Alexandra Wee, Penelope Sanderson |
Testing New Alarms for Medical Electrical Equipment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT ![In: Human-Computer Interaction - INTERACT 2005, IFIP TC13 International Conference, Rome, Italy, September 12-16, 2005, Proceedings, pp. 1146-1149, 2005, Springer, 3-540-28943-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Alejandro Quintero, Dougoukolo Konaré, Samuel Pierre |
Using Mobile Agents for Managing Control and Alarms in Urban Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, Third International Workshop, MATA 2001, Montreal, Canada, August 14-16, 2001, Proceedings, pp. 195-208, 2001, Springer, 3-540-42460-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
35 | François Gagnon, Frédéric Massicotte, Babak Esfandiari |
Using Contextual Information for IDS Alarm Classification (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 147-156, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Yan Liu 0003, Jing Zhang 0003, Xin Meng, John Strassner |
Sequential Proximity-Based Clustering for Telecommunication Network Alarm Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2008, 5th International Symposium on Neural Networks, ISNN 2008, Beijing, China, September 24-28, 2008, Proceedings, Part II, pp. 30-39, 2008, Springer, 978-3-540-87733-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Sequential proximity, Clustering, Metrics, Alarm correlation |
35 | Moon Sun Shin, Kyeong Ja Jeong |
An Alert Data Mining Framework for Network-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 38-53, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin |
DM-AMS: employing data mining techniques for alert management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 2005 National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, USA, May 15-18, 2005, pp. 103-111, 2005, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
35 | Milan Rollo, Petr Novák, Jirí Kubalík, Michal Pechoucek |
Alarm Root Cause Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BASYS ![In: Emerging Solutions for Future Manufacturing Systems, IFIP TC5 / WG5.5 Sixth IFIP International Conference on Information Technology for Balanced Automation Systems in Manufacturing and Services, 27-29 September 2004, Vienna, Austria, pp. 109-116, 2004, Springer, 0-387-22828-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Jun Liu, Khiang Wee Lim, Weng Khuen Ho, Kay Chen Tan, Rajagopalan Srinivasan, Arthur Tay |
The Intelligent Alarm Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 20(2), pp. 66-71, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
alarm systems, safety, process control, distributed control |
35 | Frantz Iwu, Ian Toyn |
Modelling and Analysing Fault Propagation in Safety-Related Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEW ![In: 28th Annual IEEE / NASA Software Engineering Workshop (SEW-28 2003), 3-4 December 2003, Greenbelt, Maryland, USA, pp. 167, 2003, IEEE Computer Society, 0-7695-2064-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Mark W. Sylor, Lingmin Meng |
Using Time over Threshold to Reduce Noise in Performance and Fault Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Services Management in Intelligent Networks, 11th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2000, Austin, Texas, USA, December 4-6, 2000, Proceedings, pp. 145-156, 2000, Springer, 3-540-41427-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Emad Aboelela, Christos Douligeris |
Fuzzy Temporal Reasoning Model for Event Correlation in Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 26th Conference on Local Computer Networks, Lowell, Massachusetts, USA, 17-20 October, 1999, pp. 150-159, 1999, IEEE Computer Society, 0-7695-0309-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Fuzzy Logic, Fault Diagnosis, Network Management, Alarm Correlation |
31 | Richard A. Wasniowski |
Database Support for Discovering Patterns in Large Datasets Collected from Multiple Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 1279-1280, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
discovering patterns, Database, data stream, sensors, false alarms |
31 | Kai Hwang 0001, Min Cai, Ying Chen, Min Qin |
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(1), pp. 41-55, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation |
31 | Min Qin, Kai Hwang 0001 |
Frequent Episode Rules for Internet Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August - 1 September 2004, Cambridge, MA, USA, pp. 161-168, 2004, IEEE Computer Society, 0-7695-2242-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
traffic datamining, Grid computing, intrusion detection, Network security, anomaly detection, false alarms |
31 | Robin N. Strickland, Hee Il Hahn |
Wavelet transform matched filters for the detection and classification of microcalcifications in mammography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings 1995 International Conference on Image Processing, Washington, DC, USA, October 23-26, 1995, pp. 422-425, 1995, IEEE Computer Society, 0-8186-7310-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
wavelet transform matched filters, microcalcification detection, microcalcification classification, biorthogonal spline wavelet, pre-whitening matched filter, digitized mammograms, multiple scales, image segmentation, wavelet transforms, image reconstruction, image classification, medical image processing, resolution, image texture, breast cancer, mammography, splines (mathematics), matched filters, zero-crossings, diagnostic radiography, false alarms, object shape |
27 | James J. Treinen, Ramakrishna Thurimella |
Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 237-244, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ayse Tosun, Ayse Basar Bener |
Reducing false alarms in software defect prediction by decision threshold optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009, October 15-16, 2009, Lake Buena Vista, Florida, USA, pp. 477-480, 2009, IEEE Computer Society, 978-1-4244-4842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Attila Licsár, László Czúni, Tamás Szirányi |
Trainable post-processing method to reduce false alarms in the detection of small blotches of archive films. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 562-565, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Zonghua Zhang, Hong Shen 0001 |
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 163-166, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Rajesh Elara Mohan, Wijerupage Sardha Wijesoma, Carlos Antonio Acosta Calderon, Changjiu Zhou |
Experimenting False Alarm Demand for Human Robot Interactions in Humanoid Soccer Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Soc. Robotics ![In: Int. J. Soc. Robotics 1(2), pp. 171-180, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Human robot teams, Robot performance, False alarm demand, Humanoid soccer robots, Autonomy modes |
26 | Shikun Chen, Zhoujun Li |
Simplifying Buffer Overflow Detection Using Site-Safe Expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 977-982, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Christian Zieger, Alessio Brutti, Piergiorgio Svaizer |
Acoustic Based Surveillance System for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, 2-4 September 2009, Genova, Italy, pp. 314-319, 2009, IEEE Computer Society, 978-0-7695-3718-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Cormac Flanagan, Stephen N. Freund |
FastTrack: efficient and precise dynamic race detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2009, Dublin, Ireland, June 15-21, 2009, pp. 121-133, 2009, ACM, 978-1-60558-392-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
concurrency, dynamic analysis, race conditions |
26 | Ítalo Cunha, Renata Teixeira, Nick Feamster, Christophe Diot |
Measurement methods for fast and accurate blackhole identification with binary tomography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, Illinois, USA, November 4-6, 2009, pp. 254-266, 2009, ACM, 978-1-60558-771-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
diagnosis, network tomography, troubleshooting |
26 | Cristina Alcaraz, Isaac Agudo, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier López 0001 |
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 86-94, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Critical Control Systems, Reputation, SCADA systems |
26 | Pat P. Banerjee, Ruben Avila, David He, Shenliang Wu, Eric Bechhoefer |
Discriminant Analysis Based Prognostics of Avionic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 37(6), pp. 1318-1326, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jacques-H. Bellec, M. Tahar Kechadi |
Cufres: clustering using fuzzy representative eventsselection for the fault recognition problem intelecommunication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIKM ![In: Proceedings of the First Ph.D. Workshop in CIKM, PIKM 2007, Sixteenth ACM Conference on Information and Knowledge Management, CIKM 2007, Lisbon, Portugal, November 9, 2007, pp. 55-62, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fault recognition, clustering, network management, alarm correlation |
26 | Jeongseok Seo, Sung Deok Cha |
Masquerade detection based on SVM and sequence-based user commands profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 398-400, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
user commands profile, support vector machine (SVM), anomaly detection, masquerade detection |
26 | Ruyan Wang, Jiaofa Chang, Keping Long, Xiaolong Yang, Dan Liu |
Distributed Fault Monitoring Scheme Based on Optical Power for Optical Burst Switching Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China, pp. 263-264, 2007, IEEE Computer Society, 0-7695-2927-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jacques-H. Bellec, M. Tahar Kechadi |
FECk: A New Efficient Clustering Algorithm for the Events Correlation Problem in Telecommunication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 469-475, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jacques-H. Bellec, M. Tahar Kechadi |
Behavioural Proximity Approach for Alarm Correlation in Telecommunication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2006: Advances in Artificial Intelligence, 5th Mexican International Conference on Artificial Intelligence, Apizaco, Mexico, November 13-17, 2006, Proceedings, pp. 674-683, 2006, Springer, 3-540-49026-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Takeshi Okamoto, Yoshiteru Ishida |
Towards an Immunity-Based Anomaly Detection System for Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 123-130, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski |
Reliable detection of episodes in event sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 7(4), pp. 415-437, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Episode pattern matching, Hidden pattern matching, Overrepresented and Underrepresented patterns, Data mining, Probabilistic analysis |
26 | Suresh Reddy, Sukumar Nandi |
Enhanced Network Traffic Anomaly Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 397-403, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Giorgio Giacinto, Roberto Perdisci, Fabio Roli |
Alarm Clustering for Intrusion Detection Systems in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 4th International Conference, MLDM 2005, Leipzig, Germany, July 9-11, 2005, Proceedings, pp. 184-193, 2005, Springer, 3-540-26923-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Clustering, Intrusion detection, Computer Security |
26 | Kwok Ho Law, Lam For Kwok |
IDS False Alarm Filtering Using KNN Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 114-121, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Robert Gwadera, Mikhail J. Atallah, Wojciech Szpankowski |
Reliable Detection of Episodes in Event Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 19-22 December 2003, Melbourne, Florida, USA, pp. 67-74, 2003, IEEE Computer Society, 0-7695-1978-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Nurit Dor, Michael Rodeh, Shmuel Sagiv |
CSSV: towards a realistic tool for statically detecting all buffer overflows in C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, San Diego, California, USA, June 9-11, 2003, pp. 155-167, 2003, ACM, 1-58113-662-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
static analysis, abstract interpretation, error detection, contracts, buffer overflow |
26 | Laurence Rozé, Marie-Odile Cordier |
Diagnosing Discrete-Event Systems: Extending the "Diagnoser Approach" to Deal with Telecommunication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Event Dyn. Syst. ![In: Discret. Event Dyn. Syst. 12(1), pp. 43-81, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
generic model, telecommunication networks, model based approach, real-time monitoring, communicating finite state machine |
26 | R. Sekar 0001, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou |
Specification-based anomaly detection: a new approach for detecting network intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 265-274, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, network monitoring |
26 | Shu Wenhui, Daniel Tan |
A Novel Intrusion Detection System Model for Securing Web-based Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 249-, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Web-based Database System, Security, Intrusion Detection System(IDS) |
26 | Peng Wu, Rajiv Bhatnagar, Lennie Epshtein, Malini Bhandaru, Zhongwen Shi |
Alarm correlation engine (ACE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 1998 Network Operations and Management Symposium, NOMS 98, New Orleans, LA, USA, February 15-20, 1998. Proceedings, pp. 733-742, 1998, IEEE, 0-7803-4352-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Nageswara S. V. Rao |
On Parallel Algorithms for Single-Fault Diagnosis in Fault Propagation Graph Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 7(12), pp. 1217-1223, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
fault propagation graph, operative diagnosis, CREW PRAM and hypercube, Fault diagnosis, single fault |
26 | Walter D. Potter, Bruce E. Tonn, Mike R. Hilliard, Gunar E. Liepins, R. T. Goeltz, S. L. Purucker |
Diagnosis, Parsimony, and Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE (Vol. 1) ![In: Proceedings of the Third International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 1990, July 15-18, 1990, The Mills House Hotel, Charleston, SC, USA - Volume 1, pp. 1-8, 1990, ACM, 0-89791-372-8. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
22 | Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Foster |
Mixing type checking and symbolic execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2010, Toronto, Ontario, Canada, June 5-10, 2010, pp. 436-447, 2010, ACM, 978-1-4503-0019-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mix rules, mixed off-the-shelf analysis, symbolic execution, precision, type checking, mix, false alarms |
22 | Jun Cai, Mohamed S. Shehata, Wael M. Badawy |
A Robust Video-Based Algorithm for Detecting Snow Movement in Traffic Scenes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Signal Process. Syst. ![In: J. Signal Process. Syst. 56(2-3), pp. 307-326, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Snow movement detection, Automatic incident detection (AID), Intelligent transportation systems (ITS), False alarms |
22 | Nuno Polónio, Carlos Regalo, Daniel Gaspar |
Real Time Notifications for Critical Parameters in Operations and Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Proceedings of the 6th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2008, 20-22 August 2008, Prague, Czech Republic, pp. 311-318, 2008, IEEE Computer Society, 978-0-7695-3302-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
critical alarms, alarm management, Pharmaceutical maintenance, CMMS, SMS |
22 | Savo Kordic, Peng Lam 0001, Jitian Xiao, Huaizhong Li |
Analysis of Alarm Sequences in a Chemical Plant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 4th International Conference, ADMA 2008, Chengdu, China, October 8-10, 2008. Proceedings, pp. 135-146, 2008, Springer, 978-3-540-88191-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Chemical plants, Data mining and Correlated alarms |
22 | Alana Platt, Nazli Goharian, Saket S. R. Mengle |
On using user query sequence to detect off-topic search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 882-883, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
clustering, time series, false alarms, misuse detection |
22 | Abdel-Nasser Al-Taani, Christoph Begall, Andreas Waadt, Guido Bruck, Peter Jung 0002 |
Trouble Shooting in Distributed Service Centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 6, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SMS-Center, Trouble Shooting, Alarms Processing, Data Mining, QoS, XML, Rule Based |
22 | Pablo Musé, Frédéric Sur, Frédéric Cao, Yann Gousseau, Jean-Michel Morel |
An A Contrario Decision Method for Shape Element Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 69(3), pp. 295-315, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
planar shape recognition, number of false alarms, meaningful matches, level lines, background model |
22 | Thomas Veit, Frédéric Cao, Patrick Bouthemy |
An a contrario Decision Framework for Region-Based Motion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 68(2), pp. 163-178, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
number of false alarms, a contrario detection, motion detection |
22 | Barry A. T. Brown, Rebecca Randell |
Building a Context Sensitive Telephone: Some Hopes and Pitfalls for Context Sensitive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Support. Cooperative Work. ![In: Comput. Support. Cooperative Work. 13(3), pp. 329-345, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
context sensitive computing, dwelling, telephones, alarms |
22 | Agnès Desolneux, Lionel Moisan, Jean-Michel Morel |
A Grouping Principle and Four Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 25(4), pp. 508-513, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Gestalt grouping laws, a contrario probabilistic model, binomial law, number of false alarms, histogram modes, clusters, alignments |
18 | Qi Jiang, Rui Wang 0018, Libin Dou, Long Jiao, Cheng Hu 0001 |
A Gaussian Mixture CPHD Filter for Multi-Target Tracking in Target-Dependent False Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(2), pp. 251, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji |
Intrusion Detection With Deep Learning Classifiers: A Synergistic Approach of Probabilistic Clustering and Human Expertise to Reduce False Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 17836-17858, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yuzhi Wan, Nadine B. Sarter |
Attention Limitations in the Detection and Identification of Alarms in Close Temporal Proximity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 66(1), pp. 234-257, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Marie-Lys Deschamps, Penelope Sanderson, Harald Waxenegger, Ismail Mohamed, Robert G. Loeb |
Auditory Sequences Presented With Spearcons Support Better Multiple Patient Monitoring Than Single-Patient Alarms: A Preclinical Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 66(3), pp. 872-890, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ahmad Diab, Rr. Nefriana, Yu-Ru Lin |
Classifying Conspiratorial Narratives At Scale: False Alarms and Erroneous Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.00141, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Rasmus Jensen, Alexandros Iosifidis |
Qualifying and raising anti-money laundering alarms with deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 214, pp. 119037, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Can Iscan, Osman Kumas, Fatma Patlar Akbulut, Akhan Akbulut |
Wallet-Based Transaction Fraud Prevention Through LightGBM With the Focus on Minimizing False Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 131465-131474, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gangireddy Narendra Kumar Reddy, M. Sabarimalai Manikandan, Neti V. L. Narasimha Murty, Linga Reddy Cenkeramaddi |
Unified Quality-Aware Compression and Pulse-Respiration Rates Estimation Framework for Reducing Energy Consumption and False Alarms of Wearable PPG Monitoring Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 41708-41740, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Samuel J. Moore, Federico Cruciani, Chris D. Nugent, Shuai Zhang 0001, Ian Cleland, Sadiq Sani |
Deep learning for network intrusion: A hierarchical approach to reduce false alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Syst. Appl. ![In: Intell. Syst. Appl. 18, pp. 200215, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Frédéric Vanderhaegen, Marion Wolff, Régis Mollard |
A heartbeat-based study of attention in the detection of digital alarms from focused and distributed supervisory control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 25(1), pp. 119-134, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhang Ying, Didier Sornette, Qingyan Meng |
A New 3-D Error Diagram for a More Balanced Assessment of Binary Alarms for Predicting Earthquakes: Application to TIR Anomalies in Sichuan Area, China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 61, pp. 1-11, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Christopher J. Hansen, Michael F. Rayo, Emily S. Patterson, Todd Yamokoski, Mahmoud Abdel-Rasoul, Theodore T. Allen, Jacob J. Socha, Susan D. Moffatt-Bruce |
Perceptually Discriminating the Highest Priority Alarms Reduces Response Time: A Retrospective Pre-Post Study at Four Hospitals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 65(4), pp. 636-650, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xavier Bou, Aitor Artola, Thibaud Ehret, Gabriele Facciolo, Jean-Michel Morel, Rafael Grompone von Gioi |
Reducing False Alarms in Video Surveillance by Deep Feature Statistical Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.04159, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rehana Mahfuz, Yinyi Guo, Arvind Krishna Sridhar, Erik Visser |
Detecting False Alarms and Misses in Audio Captions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.03326, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang 0003, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo 0001 |
Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.17445, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tukaram Muske, Alexander Serebrenik |
Survey of Approaches for Postprocessing of Static Analysis Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 55(3), pp. 48:1-48:39, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ayush Sangari, Molly A. Bingham, Mabel Cummins, Aditya Sood, Anqy Tong, Palmer Purcell, Joseph J. Schlesinger |
A Spatiotemporal and Multisensory Approach to Designing Wearable Clinical ICU Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 47(1), pp. 105, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Antonio Massaro, Dimitre Kostadinov, Alonso Silva, Alexander Obeid Guzman, Armen Aghasaryan |
Predicting Network Hardware Faults through Layered Treatment of Alarms Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(6), pp. 917, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chuanpu Fu, Qi Li 0002, Ke Xu 0002, Jianping Wu |
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1005-1019, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alvhild Skjelvik, Arnstein Vestad |
Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EICC ![In: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023, pp. 129-133, 2023, ACM, 978-1-4503-9829-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Poku Gyasi, Jiandong Wang |
Optimal alarm trippoints and timers for avoiding false alarms *. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFEPROCESS ![In: CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2023, Yibin, China, September 22-24, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-3775-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 968 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|