The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomalies with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1984 (16) 1985-1988 (17) 1989-1991 (17) 1992-1994 (25) 1995 (18) 1996-1997 (24) 1998 (20) 1999 (26) 2000 (23) 2001 (41) 2002 (52) 2003 (42) 2004 (81) 2005 (126) 2006 (155) 2007 (173) 2008 (181) 2009 (151) 2010 (83) 2011 (73) 2012 (85) 2013 (84) 2014 (88) 2015 (104) 2016 (110) 2017 (120) 2018 (145) 2019 (188) 2020 (207) 2021 (275) 2022 (286) 2023 (279) 2024 (63)
Publication types (Num. hits)
article(1246) data(1) incollection(15) inproceedings(2005) phdthesis(111)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1254 occurrences of 806 keywords

Results
Found 3378 publication records. Showing 3378 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
77Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Security Policy, Firewalls, Anomalies, Packet Filters
62Fevzi Belli, Thomas Illgen Logic Representation of Programs to Detect Arithmetic Anomalies. Search on Bibsonomy EUROMICRO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Arithmetic Anomalies, Software Legacy and Re-engineering, Logic Programming, Program Transformation, Program Testing
59Alfs T. Berztiss Usage Anomalies and Internationalization. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF usage anomalies, successful communication, international setting, cultural backgrounds, linguistic background, syntax anomalies, cultural context, linguistic misinterpretation, linguistics, cultural differences, internationalization, context switch, spelling
58Chong Hua Fam, Eun-Jung Holden, Michael Dentith, Peter Kovesi Towards the Automated Mapping of Linear Anomalies within Aeromagnetic Datasets. Search on Bibsonomy DICTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Anukool Lakhina, Mark Crovella, Christophe Diot Mining anomalies using traffic feature distributions. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly classification, network-wide traffic analysis, anomaly detection
58Ingomar Wenzel, Raimund Kirner, Peter P. Puschner, Bernhard Rieder Principles of Timing Anomalies in Superscalar Processors. Search on Bibsonomy QSIC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan Using artificial anomalies to detect unknown and known network intrusions. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Artificial anomaly, Security, Intrusion detection, Anomaly detection
58Anukool Lakhina, Mark Crovella, Christophe Diot Diagnosing network-wide traffic anomalies. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, network traffic analysis
58Paul Barford, Jeffery Kline, David Plonka, Amos Ron A signal analysis of network traffic anomalies. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
58Gunter Grieser, Steffen Lange, Thomas Zeugmann Learning Recursive Concepts with Anomalies. Search on Bibsonomy ALT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
55Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala Misconfigurations discovery between distributed security components using the mobile agent approach. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations
54Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka Detecting and Identifying Network Anomalies by Component Analysis. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network anomalies, Anomaly identification, Principal component analysis, Anomaly detection, Traffic analysis
50Carla Dionisi, Francesca Mariani, Maria Cristina Recchioni, Francesco Zirilli Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF power transmission network, cascading blackout, mathematical programming, stochastic optimization
50William Eberle, Lawrence B. Holder Discovering Structural Anomalies in Graph-Based Data. Search on Bibsonomy ICDM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot Detectability of Traffic Anomalies in Two Adjacent Networks. Search on Bibsonomy PAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Robyn R. Lutz, Ines Carmen Mikulski Empirical Analysis of Safety-Critical Anomalies During Operations. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Software and system safety, diagnostics, product metrics, maintenance process
50Anukool Lakhina, Mark Crovella, Christophe Diot Characterization of network-wide anomalies in traffic flows. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, network traffic analysis
50Hou Zunze Wavelet Transform and Its Application to Decomposition of Gravity Anomalies. Search on Bibsonomy WAA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
50Thomas Lundqvist, Per Stenström Timing Anomalies in Dynamically Scheduled Microprocessors. Search on Bibsonomy RTSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF timing anomaly, Real-time systems, resource allocation, timing analysis, worst-case execution time, out-of-order execution, dynamically scheduled processor
47Dragos D. Margineantu, Stephen Bay, Philip Chan 0001, Terran Lane Data mining methods for anomaly detection KDD-2005 workshop report. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF detection of anomalies in data, data mining, machine learning, anomalies
47Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala A secure mobile agents approach for anomalies detection on firewalls. Search on Bibsonomy iiWAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust agent, mobile agent, anomalies detection, firewalls
47Yan Guo, Lishan Kang, Fujiang Liu, Linlu Mei A New Evolutionary Neural Network and Its Application for the Extraction of Vegetation Anomalies. Search on Bibsonomy ISICA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vegetation anomalies, evolutionary algorithms, remote sensing, extraction, Evolutionary neural networks, BP algorithm
47Wolfgang John, Sven Tafvelin Analysis of internet backbone traffic and header anomalies observed. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF header anomalies, traffic analysis, internet measurement
46Kaustav Das, Jeff G. Schneider Detecting anomalous records in categorical datasets. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF machine learning, anomaly detection
43Uli Alexander Bornhauser, Peter Martini A Divergence Analysis in Autonomous Systems Using Full-Mesh iBGP. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Routing Anomalies, Networks, Border Gateway Protocol, Functional Analysis, Communication System Routing
43Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF NIDSs, Policy Anomalies, Network Security, Firewalls
43Rajesh R. Talpade, Gitae Kim, Sumit Khurana NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF network performance monitoring, network anomalies, packet delay variance, traffic analysis, flow, time to live (TTL)
42Seong Soo Kim, A. L. Narasimha Reddy Statistical techniques for detecting traffic anomalies through packet header data. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF egress filtering, packet header, real-time network anomaly detection, statistical analysis of network traffic, time series of address correlation, wavelet-based transform, network attack
42Haibin Cheng, Pang-Ning Tan, Christopher Potter, Steven A. Klooster A Robust Graph-Based Algorithm for Detection and Characterization of Anomalies in Noisy Multivariate Time Series. Search on Bibsonomy ICDM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF visualization, routing, network security, BGP
42Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina Detection and identification of network anomalies using sketch subspaces. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defeat, anomaly detection, sketch, subspace method
42Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman Combining routing and traffic data for detection of IP forwarding anomalies. Search on Bibsonomy SIGMETRICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF routing, BGP, SNMP, traffic, network anomaly detection
39Luciano Caroprese, Peter M. A. Sloot, Breanndán Ó Nualláin, Ester Zumpano A logical framework for detecting anomalies in drug resistance algorithms. Search on Bibsonomy IDEAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomalies in drug resistance algorithms, bio-medical databases, logic programming, decision support system, knowledge discovery, rule-base system
39B. Aditya Prakash, Nicholas Valler, David G. Andersen, Michalis Faloutsos, Christos Faloutsos BGP-lens: patterns and anomalies in internet routing updates. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BGP monitoring, patterns, self-similarity, anomalies
39Andrzej Wasylkowski, Andreas Zeller, Christian Lindig Detecting object usage anomalies. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF automated defect detection, automated specification generation, data mining for software engineering, object usage anomalies, programming rules, pattern recognition, static analysis
39Ioannis Ch. Paschalidis, Georgios Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF method of types, statistical anomaly detection, network security, Markov processes, large deviations
39Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi Implementation considerations for improving data integrity in normalized relational databases. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data integrity functional independency, decomposition, normalization, functional dependency
39Pavan Vatturi, Weng-Keen Wong Category detection using hierarchical mean shift. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF category detection, clustering, anomaly detection, mean shift
39Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata, Ryohei Fujimaki Network anomaly detection based on Eigen equation compression. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Eigen equation compression, network anomaly detection
39Pham Van Dung, Marat Zhanikeev, Yoshiaki Tanaka Traffic Trace Engineering. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Simulation, Analysis, Emulation, Trace, Traffic, Replay, Anomaly
39Kaustav Das, Jeff G. Schneider, Daniel B. Neill Anomaly pattern detection in categorical datasets. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine learning, anomaly detection, pattern detection
39Karim Tabia, Salem Benferhat, Yassine Djouadi A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Lingyun Yang, Chuang Liu 0006, Jennifer M. Schopf, Ian T. Foster Anomaly detection and diagnosis in grid environments. Search on Bibsonomy SC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Temporal Characteristics, Principal Component Analysis, Anomaly Detection
35Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens Complete analysis of configuration rules to guarantee reliable network security policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy anomalies, Network security, Intrusion Detection systems, Firewalls
35Jens Knoop, Eduard Mehofer Interprocedural Distribution Assignment Placement: More than Just Enhancing Intraprocedural Placing Techniques. Search on Bibsonomy IEEE PACT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF interprocedural distribution assignment placement, intraprocedural placing techniques, unnecessary run-time remappings, partially redundant distribution assignment elimination, partially dead distribution assignment elimination, algorithm hierarchy, user-customized solutions, dynamic data redistribution, optimization, parallel programming, High Performance Fortran, anomalies, distributed-memory architectures, data-parallel programs, interprocedural data-flow analysis, run-time efficiency
35Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan ASTUTE: detecting a different class of traffic anomalies. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anomaly detection, statistical test
35James M. Kang, Shashi Shekhar, Michael Henjum, Paige J. Novak, William A. Arnold Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach. Search on Bibsonomy SSTD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Jianning Mai, Lihua Yuan, Chen-Nee Chuah Detecting BGP anomalies with wavelet. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Karim Dhambri, Houari A. Sahraoui, Pierre Poulin Visual Detection of Design Anomalies. Search on Bibsonomy CSMR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Osamu Akashi, Atsushi Terauchi Diagnosis of IP-Service Anomalies Based on BGP-Update Temporal Analysis. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Hong Wang, Zhenghu Gong, Qing Guan, Baosheng Wang Detection Network Anomalies Based on Packet and Flow Analysis. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multistage filter, anomaly detection, flow analysis
35Karim Pichara, Alvaro Soto, Anita Araneda Detection of Anomalies in Large Datasets Using an Active Learning Scheme Based on Dirichlet Distributions. Search on Bibsonomy IBERAMIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano A Study on Detecting Network Anomalies Using Sampled Flow Statistics. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Grzegorz Kolaczek Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Du Zhang Fixpoint semantics for rule-base anomalies. Search on Bibsonomy IEEE ICCI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Kai Hwang 0001, Ying Chen, Hua Liu Defending Distributed Systems Against Malicious Intrusions and Network Anomalies. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Mehmet Aksit, Jan Bosch, William van der Sterren, Lodewijk Bergmans Real-Time Specification Inheritance Anomalies and Real-Time Filters. Search on Bibsonomy ECOOP The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
35Catriel Beeri, Michael Kifer A theory of intersection anomalies in relational database schemes. Search on Bibsonomy J. ACM The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
31Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch An inference system for detecting firewall filtering rules anomalies. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF filtering rules, anomalies detection, firewall, inference system
31Xiaohui Gu, Haixun Wang Online Anomaly Prediction for Robust Cluster Systems. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Hanghang Tong, Yasushi Sakurai, Tina Eliassi-Rad, Christos Faloutsos Fast mining of complex time-stamped events. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF scalability, graph mining, multi-resolution analysis
31Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella Distributed Spatial Anomaly Detection. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka Conditional Anomaly Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data mining, mining methods and algorithms
31Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
31Wenwei Li, Dafang Zhang, Jinmin Yang, Gaogang Xie, Lei Wang A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Alan D. Fekete, Dimitrios Liarokapis, Elizabeth J. O'Neil, Patrick E. O'Neil, Dennis E. Shasha Making snapshot isolation serializable. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multiversion concurrency, weak isolation, Concurrency control, consistency, serializability, anomaly, snapshot isolation
31Alexandre Bergel, Stéphane Ducasse, Oscar Nierstrasz Classbox/J: controlling the scope of change in Java. Search on Bibsonomy OOPSLA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF class extension, open-classes, module, package
31John Case, Keh-Jiann Chen, Sanjay Jain 0001 Costs of General Purpose Learning. Search on Bibsonomy STACS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
31Karl R. P. H. Leung, Daniel Kim Chung Chan Extending Statecharts with Duration. Search on Bibsonomy COMPSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
31Kenji Taguchi 0001, Keijiro Araki Extending Z with State Transition Constraints. Search on Bibsonomy COMPSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
31Anne Dinning, Edith Schonberg An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection. Search on Bibsonomy PPoPP The full citation details ... 1990 DBLP  DOI  BibTeX  RDF FORTRAN
27Giorgio C. Buttazzo Achieving Scalability in Real-Time Systems. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Elastic task model, Scheduling anomalies, Embedded systems, Dynamic voltage scaling, Real-time applications
27Ananth Grama, Vipin Kumar 0001 State of the Art in Parallel Search Techniques for Discrete Optimization Problems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF game-tree search, speedup anomalies, load balancing, Parallel processing, heuristic search, backtracking, tree search, discrete optimization
27Madalene Spezialetti, Rajiv Gupta 0001 Loop Monotonic Statements. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Access anomalies (data races), run-time dependence checking, static analysis, array bound checking, induction variables
27Robert A. Ballance, Susan L. Graham, Michael L. Van de Vanter The Pan Language-Based Editing System. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Ladle, coherent user interfaces, colander, contextual constraint, extension facilities, grammatical abstraction, interactive programming environment, logical constraint grammar, reason maintenance, syntax-recognizing editor, tolerance for errors and anomalies, logic programming, Pan
27Maurice Herlihy, Jeannette M. Wing Specifying Graceful Degradation. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF graceful degradation specification, relaxation lattice method, large class of programs, site crashes, timing anomalies, synchronization conflicts, formal specification, fault tolerant computing, network partitions, security breaches
27Yaxin Bi, Shengli Wu 0001, Pan Xiong, Xuhui Shen A Comparative Analysis for Detecting Seismic Anomalies in Data Sequences of Outgoing Longwave Radiation. Search on Bibsonomy KSEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Hwai-Jung Hsu, Feng-Jian Wang Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Florian Jäger, Joachim Hornegger, Siegfried Schwab, Rolf Janka Computer-Aided Assessment of Anomalies in the Scoliotic Spine in 3-D MRI Images. Search on Bibsonomy MICCAI (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Kivanc M. Ozonat An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Zheng Liu 0001, Jeffrey Xu Yu, Lei Chen 0002, Di Wu 0008 Detection of Shape Anomalies: A Probabilistic Approach Using Hidden Markov Models. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). Search on Bibsonomy ISPAN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Principal component analysis, Anomaly detection, Wireless mesh networks
27Deepak Agarwal Detecting anomalies in cross-classified streams: a Bayesian approach. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multiple testing, Hierarchical Bayesian, Active learning, Multidimensional
27Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack
27Mohammed Anis Benelbahri, Adel Bouhoula Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Elankayer Sithirasenan, Vallipuram Muthukkumarasamy Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan A neuro-immune model for discriminating and visualizing anomalies. Search on Bibsonomy Nat. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly visualization, neural networks, self-organizing maps, anomaly detection, artificial immune systems, negative selection, dynamic learning
27Luís Almeida 0001, Paulo Pedreiras, Ricardo Marau Traffic Scheduling Anomalies in Temporal Partitions. Search on Bibsonomy DIPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF real-time systems, real-time scheduling, real-time communication, distributed real-time systems
27Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Analysis of Policy Anomalies on Distributed Network Security Setups. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, Renata Teixeira Avoiding traceroute anomalies with Paris traceroute. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF load balancing, traceroute
27Kyrre M. Begnum, Mark Burgess Principle Components and Importance Ranking of Distributed Anomalies. Search on Bibsonomy Mach. Learn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF machine learning, anomaly detection
27Zonghua Zhang, Hong Shen 0001 Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Deepak K. Agarwal An Empirical Bayes Approach to Detect Anomalies in Dynamic Multidimensional Arrays. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan Discriminating and visualizing anomalies using negative selection and self-organizing maps. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly visualization, self-organizing maps, anomaly detection, artificial immune systems, negative selection
27Jingwei Wu, Richard C. Holt Resolving Linkage Anomalies in Extracted Software System Models. Search on Bibsonomy IWPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Yi-an Huang, Wei Fan 0001, Wenke Lee, Philip S. Yu Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Ning Jiang, Kien A. Hua, Simon Sheu Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection. Search on Bibsonomy ICDM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3378 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license