The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
74Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang Is sampled data sufficient for anomaly detection? Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF portscan, volume anomaly, anomaly detection, sampling
69Paolo Bellavista, Antonio Corradi, Luca Foschini 0001 Dynamic and context-aware streaming adaptation to smooth quality degradation due to IEEE 802.11 performance anomaly. Search on Bibsonomy J. Supercomput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Streaming adaptation, IEEE 802.11 anomaly, Wireless networks, Middleware, Service management
65João B. D. Cabrera, Lundy M. Lewis, Raman K. Mehra Detection and Classification of Intrusions and Faults using Sequences of System Calls. Search on Bibsonomy SIGMOD Rec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
65Yao Li 0002, Zhitang Li, Li Wang 0015 Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. Search on Bibsonomy ICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
65Kymie M. C. Tan, Roy A. Maxion The Effects of Algorithmic Diversity on Anomaly Detector Performance. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Yongmin Tan, Xiaohui Gu, Haixun Wang Adaptive system anomaly prediction for large-scale hosting infrastructures. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anomaly prediction, context-aware prediction model
62Kai Shen, Christopher Stewart, Chuanpeng Li, Xin Li Reference-driven performance anomaly identification. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF operating system, performance anomaly
62Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina Impact of packet sampling on anomaly detection metrics. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, sampling, network traffic analysis
62Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 Anomaly Detection in Computer Security and an Application to File System Accesses. Search on Bibsonomy ISMIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection
59Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros, Daniela Brauckhoff Automating root-cause analysis of network anomalies using frequent itemset mining. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anomaly extraction, anomaly validation, association rules
59Roy A. Maxion, Kymie M. C. Tan Anomaly Detection in Embedded Systems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dependability, anomaly detection, coverage, Anomaly
58Lionel Fillatre, Igor V. Nikiforov Non-Bayesian Detection and Detectability of Anomalies From a Few Noisy Tomographic Projections. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
57Xiaohui Gu, Haixun Wang Online Anomaly Prediction for Robust Cluster Systems. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Karim Tabia, Salem Benferhat, Yassine Djouadi A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel Anomalous system call detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian network, anomaly detection, computer security
55Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, concept drift, model update
55Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian Anomaly extraction in backbone networks using association rules. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly extraction, histogram cloning, association rules
55Yasser Yasami, Majid Farahmand, Vahid Zargari An ARP-based Anomaly Detection Algorithm Using Hidden Markov Model in Enterprise Networks. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Address Resolution Protocol (ARP), Hidden Markov Model (HMM), Anomaly Detection
55Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Temporal Characteristics, Principal Component Analysis, Anomaly Detection
55Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida An approach to spacecraft anomaly detection problem using kernel feature space. Search on Bibsonomy KDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF kernel feature space, spacecraft, von Mises Fisher distribution, principal component analysis, anomaly detection, time series data
55Kalle Burbeck, Simin Nadjm-Tehrani ADWICE - Anomaly Detection with Real-Time Incremental Clustering. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Clustering, Adaptability, Real-time, Intrusion Detection, Anomaly Detection
55Caleb C. Noble, Diane J. Cook Graph-based anomaly detection. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data mining, anomaly detection, graph regularity
55R. Sekar 0001, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou Specification-based anomaly detection: a new approach for detecting network intrusions. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, network monitoring
55Roy A. Maxion, Kymie M. C. Tan Benchmarking Anomaly-Based Detection Systems. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF intrusion detection, benchmarking, Anomaly detection, computer security, empirical methods
52Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan Using artificial anomalies to detect unknown and known network intrusions. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Artificial anomaly, Security, Intrusion detection, Anomaly detection
52Daniela Brauckhoff, Martin May, Bernhard Plattner Comparison of anomaly signal quality in common detection metrics. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly exposure measure, signal comparison, anomaly detection
52Cheng-Fa Tsai, Chia-Chen Yen Unsupervised Anomaly Detection Using HDG-Clustering Algorithm. Search on Bibsonomy ICONIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unsupervised anomaly detection, data mining, intrusion detection, anomaly detection, data clustering
52George K. Baah, Alexander G. Gray, Mary Jean Harrold On-line anomaly detection of deployed software: a statistical machine learning approach. Search on Bibsonomy SOQUA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly diagnosis, machine learning, anomaly detection, Markov models, fault localization
52Kymie M. C. Tan, Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detector coverage, minimal foreign sequence, stide, performance evaluation, Anomaly detection
50Shashank Shanbhag, Tilman Wolf Massively Parallel Anomaly Detection in Online Network Measurement. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Xue Wang 0001, Daowei Bi, Liang Ding, Sheng Wang 0010 Bootstrap Gaussian Process classifiers for rotating machinery anomaly detection. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Roberto Perdisci, Guofei Gu, Wenke Lee Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50L. Lawrence Ho, Christopher J. Macey, Ronald Hiller A Distributed and Reliable Platform for Adaptive Anomaly Detection in IP Networks. Search on Bibsonomy DSOM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
48Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). Search on Bibsonomy ISPAN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Principal component analysis, Anomaly detection, Wireless mesh networks
48Yongsu Park, Jaeheung Lee, Yookun Cho Intrusion Detection Using Noisy Training Data. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, intrusion detection, anomaly detection, system call
47Varun Chandola, Arindam Banerjee 0001, Vipin Kumar 0001 Anomaly detection: A survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Anomaly detection, outlier detection
47Peng Li 0059, Debin Gao, Michael K. Reiter Automatically Adapting a Trained Anomaly Detector to Software Patches. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software patches, system-call monitoring, binary difference analysis, Anomaly detection
47Tao Xiang 0002, Shaogang Gong Video Behavior Profiling for Anomaly Detection. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Behaviour profiling, Dynamic Scene Modelling, FeatureSelection, Anomaly Detection, Dynamic Bayesian Networks, Spectral clustering
47Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck Incorporation of Application Layer Protocol Syntax into Anomaly Detection. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly Detection, Web Security, Protocol Analysis
47George Nychis, Vyas Sekar, David G. Andersen, Hyong Kim, Hui Zhang 0001 An empirical evaluation of entropy-based traffic anomaly detection. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF entropy, anomaly detection
47Arnur G. Tokhtabayev, Victor A. Skormin Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly Propagation, Intrusion detection, Markov Models
47Takeshi Okamoto, Yoshiteru Ishida Framework of an Immunity-Based Anomaly Detection System for User Behavior. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Immunity-based system, Hidden Markov model, Anomaly detection, Computer security, ROC
47Quan Qian, Mingjun Xin Research on Hidden Markov Model for System Call Anomaly Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host System Calls, Hidden Markov Model, Anomaly Detection
47Augustin Soule, Fernando Silveira, Haakon Ringberg, Christophe Diot Challenging the supremacy of traffic matrices in anomaly detection. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF traffic aggregation, anomaly detection
47Adrian Spalka, Jan Lehnhardt A Comprehensive Approach to Anomaly Detection in Relational Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF relational databases, anomaly detection, Database security, misuse detection
47Xiaoshu Hang, Honghua Dai 0001 Applying both positive and negative selection to supervised learning for anomaly detection. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF positive selection, anomaly detection, artificial immune system, supervised learning, negative selection
47Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain
45Anukool Lakhina, Mark Crovella, Christophe Diot Mining anomalies using traffic feature distributions. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly classification, network-wide traffic analysis, anomaly detection
45Stefan Skludarek, Hirosuke Yamamoto Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data. Search on Bibsonomy ADMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unsupervised Anomaly Detection, Anomaly Detection, Time Series Analysis, Masquerade Detection, Training Data
45Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro NADA - Network Anomaly Detection Algorithm. Search on Bibsonomy DSOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Traffic Anomaly Identification, Anomaly Signature
43Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Ashish Kamra, Elisa Bertino, Rimma V. Nehme Responding to Anomalous Database Requests. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Hongli Luo, Mei-Ling Shyu Provision of Quality of Service with Router Support. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Shashank Shanbhag, Tilman Wolf Accurate anomaly detection through parallelism. Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou Network anomaly detection and classification via opportunistic sampling. Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka Conditional Anomaly Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data mining, mining methods and algorithms
43Paolo Bellavista, Antonio Corradi, Luca Foschini 0001 Context-Aware Multimedia Middleware Solutions for Counteracting IEEE 802.11 Performance Anomaly. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Ye Wang, Hussein M. Abdel-Wahab A Multilayer Approach of Anomaly Detection for Email Systems. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Carrie Gates, Carol Taylor Challenging the anomaly detection paradigm: a provocative discussion. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, intrusion detection
43Christoph C. Michael Finding the Vocabulary of Program Behavior Data for Anomaly Detection. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina Detection and identification of network anomalies using sketch subspaces. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defeat, anomaly detection, sketch, subspace method
41Gaurav Tandon, Philip K. Chan, Debasis Mitra 0003 MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, data cleaning, motifs
40Pedro Henriques dos Santos Teixeira, Ruy Luiz Milidiú Data stream anomaly detection through principal subspace tracking. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data streams, anomaly detection, time series, dimensionality reduction, unsupervised learning
40Hwa-Ju Lee, Kyung-Sook Lee, Ihn-Han Bae A weighted-dissimilarity-based anomaly detection method for mobile networks. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, mobile wireless networks, dissimilarity
40Marcus Chang, Andreas Terzis, Philippe Bonnet Mote-Based Online Anomaly Detection Using Echo State Networks. Search on Bibsonomy DCOSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Real-time, Anomaly detection
40Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero Selecting and Improving System Call Models for Anomaly Detection. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF System Call Models, Self Organizing Map, Anomaly Detection, Stochastic Models, Deterministic Models
40Huijuan Lu, Jianguo Chen, Wei Wei Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian networks, Anomaly detection
40Oliver Obst, X. Rosalind Wang, Mikhail Prokopenko Using Echo State Networks for Anomaly Detection in Underground Coal Mines. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coal mines, sensor networks, bayesian networks, anomaly detection, recurrent neural networks, echo state networks
40Yang Li 0002, Li Guo 0001 TCM-KNN scheme for network anomaly detection using feature-based optimizations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight
40Salem Benferhat, Karim Tabia Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly detection, diagnosis, traffic profiling
40Pedro Casas, Lionel Fillatre, Sandrine Vaton, Igor V. Nikiforov Volume Anomaly Detection in Data Networks: An Optimal Detection Algorithm vs. the PCA Approach. Search on Bibsonomy FITraMEn The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network Monitoring and Traffic Analysis, Optimal Volume Anomaly Detection, Network Traffic Modeling
40Jinfu Wang 0001, John Bigham Anomaly detection in the case of message oriented middleware. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, message oriented middleware, self-protection
40Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen Network anomaly detection based on TCM-KNN algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCM-KNN algorithm, machine learning, network security, anomaly detection
40Kenneth L. Ingham, Anil Somayaji A methodology for designing accurate anomaly detection systems. Search on Bibsonomy LANC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web server security, intrusion detection, anomaly detection, HTTP
40Sang Hyun Oh, Won Suk Lee Anomaly Intrusion Detection Based on Dynamic Cluster Updating. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Mining, Clustering, Intrusion Detection, Anomaly Detection
40Prahlad Fogla, Wenke Lee Evading network anomaly detection systems: formal reasoning and practical techniques. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF polymorphic blending attack, anomaly detection, mimicry attack
40Dan Li 0002, Kefei Wang, Jitender S. Deogun FADS: A Fuzzy Anomaly Detection System. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, anomaly detection, Fuzzy theory
40Shrijit S. Joshi, Vir V. Phoha Investigating hidden Markov models capabilities in anomaly detection. Search on Bibsonomy ACM Southeast Regional Conference (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly detection system, hidden Markov models
40Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Gray-box extraction of execution graphs for anomaly detection. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call monitor, intrusion detection, anomaly detection, control flow graph
40John Zachary, John C. McEachen, Daniel W. Ettlich Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection
40Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix
40Fabio A. González 0001, Dipankar Dasgupta Anomaly Detection Using Real-Valued Negative Selection. Search on Bibsonomy Genet. Program. Evolvable Mach. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF matching rule, self-organizing maps, anomaly detection, artificial immune systems, negative selection
40Albert J. Höglund, Kimmo Hätönen, Antti S. Sorvari A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. Search on Bibsonomy IJCNN (5) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Self-Organizing Map (SOM), anomaly detection, novelty detection, host-based intrusion detection
40Ulrike Lechner, Christian Lengauer, Friederike Nickl, Martin Wirsing (Objects + Concurrency) & Reusability - A Proposal to Circumvent the Inheritance Anomaly. Search on Bibsonomy ECOOP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Concurrent rewriting, parallelism, reusability, Maude, inheritance anomaly
38Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka Detecting and Identifying Network Anomalies by Component Analysis. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network anomalies, Anomaly identification, Principal component analysis, Anomaly detection, Traffic analysis
36Jiong Zhang, Mohammad Zulkernine, Anwar Haque Random-Forests-Based Network Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jiong Zhang, Mohammad Zulkernine A Hybrid Network Intrusion Detection Technique Using Random Forests. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid detection, Data mining, Intrusion detection, Network security, Random forests
36Lobel Crnogorac, Anand S. Rao, Kotagiri Ramamohanarao Classifying Inheritance Mechanisms in Concurrent Object Oriented Programming. Search on Bibsonomy ECOOP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36See-hwan Yoo, Tae-Kyung Kim, Chuck Yoo Resolving Performance Anomaly Using ARF-Aware TCP. Search on Bibsonomy SEUS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Junsup Lee, Sung Deok Cha Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Xinguang Peng, Yanyan Zhang Robust Host Anomaly Detector Using Strong Isolation. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Martin Rehák, Michal Pechoucek, Martin Grill, Karel Bartos Trust-Based Classifier Combination for Network Anomaly Detection. Search on Bibsonomy CIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Ji Zhang, Qigang Gao, Hai H. Wang Anomaly detection in high-dimensional network data streams: A case study. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Takuo Nakashima, Shunsuke Oshima, Yusuke Nishikido, Toshinori Sueyoshi Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 16067 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license