|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1254 occurrences of 806 keywords
|
|
|
Results
Found 3378 publication records. Showing 3378 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 15-29, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
62 | Fevzi Belli, Thomas Illgen |
Logic Representation of Programs to Detect Arithmetic Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 26th EUROMICRO 2000 Conference, Informatics: Inventing the Future, 5-7 September 2000, Maastricht, The Netherlands, pp. 2216-, 2000, IEEE Computer Society, 0-7695-0780-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Arithmetic Anomalies, Software Legacy and Re-engineering, Logic Programming, Program Transformation, Program Testing |
59 | Alfs T. Berztiss |
Usage Anomalies and Internationalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 108-114, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
usage anomalies, successful communication, international setting, cultural backgrounds, linguistic background, syntax anomalies, cultural context, linguistic misinterpretation, linguistics, cultural differences, internationalization, context switch, spelling |
58 | Chong Hua Fam, Eun-Jung Holden, Michael Dentith, Peter Kovesi |
Towards the Automated Mapping of Linear Anomalies within Aeromagnetic Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTA ![In: Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, DICTA 2007, 3-5 December 2007, Adelaide, Australia, pp. 424-429, 2007, IEEE Computer Society, 0-7695-3067-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Mining anomalies using traffic feature distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005, pp. 217-228, 2005, ACM, 1-59593-009-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomaly classification, network-wide traffic analysis, anomaly detection |
58 | Ingomar Wenzel, Raimund Kirner, Peter P. Puschner, Bernhard Rieder |
Principles of Timing Anomalies in Superscalar Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Fifth International Conference on Quality Software (QSIC 2005), 19-20 September 2005, Melbourne, Australia, pp. 295-306, 2005, IEEE Computer Society, 0-7695-2472-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan |
Using artificial anomalies to detect unknown and known network intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 6(5), pp. 507-527, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Artificial anomaly, Security, Intrusion detection, Anomaly detection |
58 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Diagnosing network-wide traffic anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 219-230, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, network traffic analysis |
58 | Paul Barford, Jeffery Kline, David Plonka, Amos Ron |
A signal analysis of network traffic anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Workshop ![In: Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, IMW 2002, Marseille, France, November 6-8, 2002, pp. 71-82, 2002, ACM, 1-58113-603-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
58 | Gunter Grieser, Steffen Lange, Thomas Zeugmann |
Learning Recursive Concepts with Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 11th International Conference, ALT 2000, Sydney, Australia, December 11-13, 2000, Proceedings, pp. 101-115, 2000, Springer, 3-540-41237-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
55 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
Misconfigurations discovery between distributed security components using the mobile agent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 663-668, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations |
54 | Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka |
Detecting and Identifying Network Anomalies by Component Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 501-504, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network anomalies, Anomaly identification, Principal component analysis, Anomaly detection, Traffic analysis |
50 | Carla Dionisi, Francesca Mariani, Maria Cristina Recchioni, Francesco Zirilli |
Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers, pp. 1-13, 2008, Springer, 978-3-642-03551-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
power transmission network, cascading blackout, mathematical programming, stochastic optimization |
50 | William Eberle, Lawrence B. Holder |
Discovering Structural Anomalies in Graph-Based Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), October 28-31, 2007, Omaha, Nebraska, USA, pp. 393-398, 2007, IEEE Computer Society, 0-7695-3033-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot |
Detectability of Traffic Anomalies in Two Adjacent Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, Proceedings, pp. 22-31, 2007, Springer, 978-3-540-71616-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Robyn R. Lutz, Ines Carmen Mikulski |
Empirical Analysis of Safety-Critical Anomalies During Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 30(3), pp. 172-180, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Software and system safety, diagnostics, product metrics, maintenance process |
50 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Characterization of network-wide anomalies in traffic flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 201-206, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, network traffic analysis |
50 | Hou Zunze |
Wavelet Transform and Its Application to Decomposition of Gravity Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAA ![In: Wavelet Analysis and Its Applications, Second International Conference, WAA 2001, Hong Kong, China, December 18-20, 2001, Proceedings, pp. 404-410, 2001, Springer, 3-540-43034-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
50 | Thomas Lundqvist, Per Stenström |
Timing Anomalies in Dynamically Scheduled Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 20th IEEE Real-Time Systems Symposium, Phoenix, AZ, USA, December 1-3, 1999, pp. 12-21, 1999, IEEE Computer Society, 0-7695-0475-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
timing anomaly, Real-time systems, resource allocation, timing analysis, worst-case execution time, out-of-order execution, dynamically scheduled processor |
47 | Dragos D. Margineantu, Stephen Bay, Philip Chan 0001, Terran Lane |
Data mining methods for anomaly detection KDD-2005 workshop report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 7(2), pp. 132-136, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
detection of anomalies in data, data mining, machine learning, anomalies |
47 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
A secure mobile agents approach for anomalies detection on firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 689-693, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trust agent, mobile agent, anomalies detection, firewalls |
47 | Yan Guo, Lishan Kang, Fujiang Liu, Linlu Mei |
A New Evolutionary Neural Network and Its Application for the Extraction of Vegetation Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Second International Symposium, ISICA 2007, Wuhan, China, September 21-23, 2007, Proceedings, pp. 243-252, 2007, Springer, 978-3-540-74580-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
vegetation anomalies, evolutionary algorithms, remote sensing, extraction, Evolutionary neural networks, BP algorithm |
47 | Wolfgang John, Sven Tafvelin |
Analysis of internet backbone traffic and header anomalies observed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 111-116, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
header anomalies, traffic analysis, internet measurement |
46 | Kaustav Das, Jeff G. Schneider |
Detecting anomalous records in categorical datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 220-229, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
43 | Uli Alexander Bornhauser, Peter Martini |
A Divergence Analysis in Autonomous Systems Using Full-Mesh iBGP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 600-608, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Routing Anomalies, Networks, Border Gateway Protocol, Functional Analysis, Communication System Routing |
43 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings, pp. 182-194, 2006, Springer, 3-540-45762-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
NIDSs, Policy Anomalies, Network Security, Firewalls |
43 | Rajesh R. Talpade, Gitae Kim, Sumit Khurana |
NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 6-8 July 1999, Sharm El Sheikh, Red Sea, Egypt, pp. 442-452, 1999, IEEE Computer Society, 0-7695-0250-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
network performance monitoring, network anomalies, packet delay variance, traffic analysis, flow, time to live (TTL) |
42 | Seong Soo Kim, A. L. Narasimha Reddy |
Statistical techniques for detecting traffic anomalies through packet header data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(3), pp. 562-575, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
egress filtering, packet header, real-time network anomaly detection, statistical analysis of network traffic, time series of address correlation, wavelet-based transform, network attack |
42 | Haibin Cheng, Pang-Ning Tan, Christopher Potter, Steven A. Klooster |
A Robust Graph-Based Algorithm for Detection and Characterization of Anomalies in Noisy Multivariate Time Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 349-358, 2008, IEEE Computer Society, 978-0-7695-3503-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 81-90, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, routing, network security, BGP |
42 | Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina |
Detection and identification of network anomalies using sketch subspaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 147-152, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defeat, anomaly detection, sketch, subspace method |
42 | Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci |
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1047-1059, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman |
Combining routing and traffic data for detection of IP forwarding anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2004, June 10-14, 2004, New York, NY, USA, pp. 416-417, 2004, ACM, 1-58113-873-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
routing, BGP, SNMP, traffic, network anomaly detection |
39 | Luciano Caroprese, Peter M. A. Sloot, Breanndán Ó Nualláin, Ester Zumpano |
A logical framework for detecting anomalies in drug resistance algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: International Database Engineering and Applications Symposium (IDEAS 2009), September 16-18, 2009, Cetraro, Calabria, Italy, pp. 23-30, 2009, ACM, 978-1-60558-402-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomalies in drug resistance algorithms, bio-medical databases, logic programming, decision support system, knowledge discovery, rule-base system |
39 | B. Aditya Prakash, Nicholas Valler, David G. Andersen, Michalis Faloutsos, Christos Faloutsos |
BGP-lens: patterns and anomalies in internet routing updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1315-1324, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
BGP monitoring, patterns, self-similarity, anomalies |
39 | Andrzej Wasylkowski, Andreas Zeller, Christian Lindig |
Detecting object usage anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 35-44, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
automated defect detection, automated specification generation, data mining for software engineering, object usage anomalies, programming rules, pattern recognition, static analysis |
39 | Ioannis Ch. Paschalidis, Georgios Smaragdakis |
Spatio-temporal network anomaly detection by assessing deviations of empirical measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(3), pp. 685-697, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
method of types, statistical anomaly detection, network security, Markov processes, large deviations |
39 | Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi |
Implementation considerations for improving data integrity in normalized relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data integrity functional independency, decomposition, normalization, functional dependency |
39 | Pavan Vatturi, Weng-Keen Wong |
Category detection using hierarchical mean shift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 847-856, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
category detection, clustering, anomaly detection, mean shift |
39 | Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata, Ryohei Fujimaki |
Network anomaly detection based on Eigen equation compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1185-1194, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Eigen equation compression, network anomaly detection |
39 | Pham Van Dung, Marat Zhanikeev, Yoshiaki Tanaka |
Traffic Trace Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 1-10, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Simulation, Analysis, Emulation, Trace, Traffic, Replay, Anomaly |
39 | Kaustav Das, Jeff G. Schneider, Daniel B. Neill |
Anomaly pattern detection in categorical datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 169-176, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection, pattern detection |
39 | Karim Tabia, Salem Benferhat, Yassine Djouadi |
A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 919-926, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Lingyun Yang, Chuang Liu 0006, Jennifer M. Schopf, Ian T. Foster |
Anomaly detection and diagnosis in grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE Conference on High Performance Networking and Computing, SC 2007, November 10-16, 2007, Reno, Nevada, USA, pp. 33, 2007, ACM Press, 978-1-59593-764-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun |
Traffic Anomaly Detection and Characterization in the Tunisian National University Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 136-147, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Temporal Characteristics, Principal Component Analysis, Anomaly Detection |
35 | Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens |
Complete analysis of configuration rules to guarantee reliable network security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(2), pp. 103-122, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Policy anomalies, Network security, Intrusion Detection systems, Firewalls |
35 | Jens Knoop, Eduard Mehofer |
Interprocedural Distribution Assignment Placement: More than Just Enhancing Intraprocedural Placing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE PACT ![In: Proceedings of the 1997 Conference on Parallel Architectures and Compilation Techniques (PACT '97), San Francisco, CA, USA, October 11-15, 1997, pp. 26-, 1997, IEEE Computer Society, 0-8186-8090-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
interprocedural distribution assignment placement, intraprocedural placing techniques, unnecessary run-time remappings, partially redundant distribution assignment elimination, partially dead distribution assignment elimination, algorithm hierarchy, user-customized solutions, dynamic data redistribution, optimization, parallel programming, High Performance Fortran, anomalies, distributed-memory architectures, data-parallel programs, interprocedural data-flow analysis, run-time efficiency |
35 | Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan |
ASTUTE: detecting a different class of traffic anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 267-278, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly detection, statistical test |
35 | James M. Kang, Shashi Shekhar, Michael Henjum, Paige J. Novak, William A. Arnold |
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSTD ![In: Advances in Spatial and Temporal Databases, 11th International Symposium, SSTD 2009, Aalborg, Denmark, July 8-10, 2009, Proceedings, pp. 44-61, 2009, Springer, 978-3-642-02981-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Jianning Mai, Lihua Yuan, Chen-Nee Chuah |
Detecting BGP anomalies with wavelet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 465-472, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Karim Dhambri, Houari A. Sahraoui, Pierre Poulin |
Visual Detection of Design Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 12th European Conference on Software Maintenance and Reengineering, CSMR 2008, April 1-4, 2008, Athens, Greece, pp. 279-283, 2008, IEEE Computer Society, 978-1-4244-2157-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Osamu Akashi, Atsushi Terauchi |
Diagnosis of IP-Service Anomalies Based on BGP-Update Temporal Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPOM ![In: IP Operations and Management, 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings, pp. 28-40, 2008, Springer, 978-3-540-87356-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Hong Wang, Zhenghu Gong, Qing Guan, Baosheng Wang |
Detection Network Anomalies Based on Packet and Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 497-502, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multistage filter, anomaly detection, flow analysis |
35 | Karim Pichara, Alvaro Soto, Anita Araneda |
Detection of Anomalies in Large Datasets Using an Active Learning Scheme Based on Dirichlet Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IBERAMIA ![In: Advances in Artificial Intelligence - IBERAMIA 2008, 11th Ibero-American Conference on AI, Lisbon, Portugal, October 14-17, 2008. Proceedings, pp. 163-172, 2008, Springer, 978-3-540-88308-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano |
A Study on Detecting Network Anomalies Using Sampled Flow Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 81, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Grzegorz Kolaczek |
Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 486-495, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Du Zhang |
Fixpoint semantics for rule-base anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the 4th IEEE International Conference on Cognitive Informatics (ICCI 2005), August 8-10, 2005, University of California, Irvine, USA, pp. 10-17, 2005, IEEE Computer Society, 0-7803-9136-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kai Hwang 0001, Ying Chen, Hua Liu |
Defending Distributed Systems Against Malicious Intrusions and Network Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Mehmet Aksit, Jan Bosch, William van der Sterren, Lodewijk Bergmans |
Real-Time Specification Inheritance Anomalies and Real-Time Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: Object-Oriented Programming, Proceedings of the 8th European Conference, ECOOP '94, Bologna, Italy, July 4-8, 1994, pp. 386-407, 1994, Springer, 3-540-58202-9. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
35 | Catriel Beeri, Michael Kifer |
A theory of intersection anomalies in relational database schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 34(3), pp. 544-577, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
An inference system for detecting firewall filtering rules anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2122-2128, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
filtering rules, anomalies detection, firewall, inference system |
31 | Xiaohui Gu, Haixun Wang |
Online Anomaly Prediction for Robust Cluster Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 1000-1011, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Hanghang Tong, Yasushi Sakurai, Tina Eliassi-Rad, Christos Faloutsos |
Fast mining of complex time-stamped events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 759-768, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
scalability, graph mining, multi-resolution analysis |
31 | Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella |
Distributed Spatial Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1705-1713, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka |
Conditional Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 19(5), pp. 631-645, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, mining methods and algorithms |
31 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 33-40, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
31 | Wenwei Li, Dafang Zhang, Jinmin Yang, Gaogang Xie, Lei Wang |
A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part III, pp. 184-189, 2006, Springer, 3-540-34482-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Alan D. Fekete, Dimitrios Liarokapis, Elizabeth J. O'Neil, Patrick E. O'Neil, Dennis E. Shasha |
Making snapshot isolation serializable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 30(2), pp. 492-528, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multiversion concurrency, weak isolation, Concurrency control, consistency, serializability, anomaly, snapshot isolation |
31 | Alexandre Bergel, Stéphane Ducasse, Oscar Nierstrasz |
Classbox/J: controlling the scope of change in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2005, October 16-20, 2005, San Diego, CA, USA, pp. 177-189, 2005, ACM, 1-59593-031-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
class extension, open-classes, module, package |
31 | John Case, Keh-Jiann Chen, Sanjay Jain 0001 |
Costs of General Purpose Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999, Proceedings, pp. 424-433, 1999, Springer. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
31 | Karl R. P. H. Leung, Daniel Kim Chung Chan |
Extending Statecharts with Duration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: COMPSAC '96 - 20th Computer Software and Applications Conference, August 19-23, 1996, Seoul, Korea, pp. 246-251, 1996, IEEE Computer Society, 0-8186-7579-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
31 | Kenji Taguchi 0001, Keijiro Araki |
Extending Z with State Transition Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: COMPSAC '96 - 20th Computer Software and Applications Conference, August 19-23, 1996, Seoul, Korea, pp. 246-260, 1996, IEEE Computer Society, 0-8186-7579-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
31 | Anne Dinning, Edith Schonberg |
An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPoPP ![In: Proceedings of the Second ACM SIGPLAN Symposium on Princiles & Practice of Parallel Programming (PPOPP), Seattle, Washington, USA, March 14-16, 1990, pp. 1-10, 1990, ACM, 0-89791-350-7. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
FORTRAN |
27 | Giorgio C. Buttazzo |
Achieving Scalability in Real-Time Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(5), pp. 54-59, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Elastic task model, Scheduling anomalies, Embedded systems, Dynamic voltage scaling, Real-time applications |
27 | Ananth Grama, Vipin Kumar 0001 |
State of the Art in Parallel Search Techniques for Discrete Optimization Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 11(1), pp. 28-35, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
game-tree search, speedup anomalies, load balancing, Parallel processing, heuristic search, backtracking, tree search, discrete optimization |
27 | Madalene Spezialetti, Rajiv Gupta 0001 |
Loop Monotonic Statements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 21(6), pp. 497-505, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Access anomalies (data races), run-time dependence checking, static analysis, array bound checking, induction variables |
27 | Robert A. Ballance, Susan L. Graham, Michael L. Van de Vanter |
The Pan Language-Based Editing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 1(1), pp. 95-127, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Ladle, coherent user interfaces, colander, contextual constraint, extension facilities, grammatical abstraction, interactive programming environment, logical constraint grammar, reason maintenance, syntax-recognizing editor, tolerance for errors and anomalies, logic programming, Pan |
27 | Maurice Herlihy, Jeannette M. Wing |
Specifying Graceful Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 2(1), pp. 93-104, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
graceful degradation specification, relaxation lattice method, large class of programs, site crashes, timing anomalies, synchronization conflicts, formal specification, fault tolerant computing, network partitions, security breaches |
27 | Yaxin Bi, Shengli Wu 0001, Pan Xiong, Xuhui Shen |
A Comparative Analysis for Detecting Seismic Anomalies in Data Sequences of Outgoing Longwave Radiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSEM ![In: Knowledge Science, Engineering and Management, Third International Conference, KSEM 2009, Vienna, Austria, November 25-27, 2009. Proceedings, pp. 285-296, 2009, Springer, 978-3-642-10487-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Hwai-Jung Hsu, Feng-Jian Wang |
Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 275-280, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Florian Jäger, Joachim Hornegger, Siegfried Schwab, Rolf Janka |
Computer-Aided Assessment of Anomalies in the Scoliotic Spine in 3-D MRI Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICCAI (1) ![In: Medical Image Computing and Computer-Assisted Intervention - MICCAI 2009, 12th International Conference, London, UK, September 20-24, 2009, Proceedings, Part II, pp. 819-826, 2009, Springer, 978-3-642-04270-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Kivanc M. Ozonat |
An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 522-531, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Zheng Liu 0001, Jeffrey Xu Yu, Lei Chen 0002, Di Wu 0008 |
Detection of Shape Anomalies: A Probabilistic Approach Using Hidden Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 1325-1327, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro |
Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 5833-5837, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors |
Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 9th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2008, 7-9 May 2008, Sydney, NSW, Australia, pp. 266-271, 2008, IEEE Computer Society, 978-0-7695-3125-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Principal component analysis, Anomaly detection, Wireless mesh networks |
27 | Deepak Agarwal |
Detecting anomalies in cross-classified streams: a Bayesian approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 11(1), pp. 29-44, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multiple testing, Hierarchical Bayesian, Active learning, Multidimensional |
27 | Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry |
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(1), pp. 56-70, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack |
27 | Mohammed Anis Benelbahri, Adel Bouhoula |
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 63-70, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 66-71, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan |
A neuro-immune model for discriminating and visualizing anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Comput. ![In: Nat. Comput. 5(3), pp. 285-304, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anomaly visualization, neural networks, self-organizing maps, anomaly detection, artificial immune systems, negative selection, dynamic learning |
27 | Luís Almeida 0001, Paulo Pedreiras, Ricardo Marau |
Traffic Scheduling Anomalies in Temporal Partitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIPES ![In: From Model-Driven Design to Resource Management for Distributed Embedded Systems, IFIP TC 10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2006), October 11-13, 2006, Braga, Portugal, pp. 95-104, 2006, Springer, 978-0-387-39361-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
real-time systems, real-time scheduling, real-time communication, distributed real-time systems |
27 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Analysis of Policy Anomalies on Distributed Network Security Setups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 496-511, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, Renata Teixeira |
Avoiding traceroute anomalies with Paris traceroute. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 153-158, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
load balancing, traceroute |
27 | Kyrre M. Begnum, Mark Burgess |
Principle Components and Importance Ranking of Distributed Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. ![In: Mach. Learn. 58(2-3), pp. 217-230, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
27 | Zonghua Zhang, Hong Shen 0001 |
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 118-127, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Deepak K. Agarwal |
An Empirical Bayes Approach to Detect Anomalies in Dynamic Multidimensional Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA, pp. 26-33, 2005, IEEE Computer Society, 0-7695-2278-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan |
Discriminating and visualizing anomalies using negative selection and self-organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Proceedings, Washington DC, USA, June 25-29, 2005, pp. 297-304, 2005, ACM, 1-59593-010-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomaly visualization, self-organizing maps, anomaly detection, artificial immune systems, negative selection |
27 | Jingwei Wu, Richard C. Holt |
Resolving Linkage Anomalies in Extracted Software System Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWPC ![In: 12th International Workshop on Program Comprehension (IWPC 2004), 24-26 June 2004, Bari, Italy, pp. 241-245, 2004, IEEE Computer Society, 0-7695-2149-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Yi-an Huang, Wei Fan 0001, Wenke Lee, Philip S. Yu |
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 478-, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Ning Jiang, Kien A. Hua, Simon Sheu |
Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 9-12 December 2002, Maebashi City, Japan, pp. 637-640, 2002, IEEE Computer Society, 0-7695-1754-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3378 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|