|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang |
Is sampled data sufficient for anomaly detection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 165-176, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
portscan, volume anomaly, anomaly detection, sampling |
69 | Paolo Bellavista, Antonio Corradi, Luca Foschini 0001 |
Dynamic and context-aware streaming adaptation to smooth quality degradation due to IEEE 802.11 performance anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 45(1), pp. 15-28, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Streaming adaptation, IEEE 802.11 anomaly, Wireless networks, Middleware, Service management |
65 | João B. D. Cabrera, Lundy M. Lewis, Raman K. Mehra |
Detection and Classification of Intrusions and Faults using Sequences of System Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 30(4), pp. 25-34, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
65 | Yao Li 0002, Zhitang Li, Li Wang 0015 |
Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Intelligent Computing, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part I, pp. 553-562, 2006, Springer, 3-540-37271-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Kymie M. C. Tan, Roy A. Maxion |
The Effects of Algorithmic Diversity on Anomaly Detector Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 216-225, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Yongmin Tan, Xiaohui Gu, Haixun Wang |
Adaptive system anomaly prediction for large-scale hosting infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010, pp. 173-182, 2010, ACM, 978-1-60558-888-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly prediction, context-aware prediction model |
62 | Kai Shen, Christopher Stewart, Chuanpeng Li, Xin Li |
Reference-driven performance anomaly identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2009, Seattle, WA, USA, June 15-19, 2009, pp. 85-96, 2009, ACM, 978-1-60558-511-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
operating system, performance anomaly |
62 | Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina |
Impact of packet sampling on anomaly detection metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 159-164, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, sampling, network traffic analysis |
62 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 |
Anomaly Detection in Computer Security and an Application to File System Accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 15th International Symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings, pp. 14-28, 2005, Springer, 3-540-25878-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection |
59 | Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros, Daniela Brauckhoff |
Automating root-cause analysis of network anomalies using frequent itemset mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 467-468, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly extraction, anomaly validation, association rules |
59 | Roy A. Maxion, Kymie M. C. Tan |
Anomaly Detection in Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(2), pp. 108-120, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dependability, anomaly detection, coverage, Anomaly |
58 | Lionel Fillatre, Igor V. Nikiforov |
Non-Bayesian Detection and Detectability of Anomalies From a Few Noisy Tomographic Projections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 55(2), pp. 401-413, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Xiaohui Gu, Haixun Wang |
Online Anomaly Prediction for Robust Cluster Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 1000-1011, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Karim Tabia, Salem Benferhat, Yassine Djouadi |
A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 919-926, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel |
Anomalous system call detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(1), pp. 61-93, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian network, anomaly detection, computer security |
55 | Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo |
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 39-46, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, concept drift, model update |
55 | Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian |
Anomaly extraction in backbone networks using association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, Illinois, USA, November 4-6, 2009, pp. 28-34, 2009, ACM, 978-1-60558-771-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly extraction, histogram cloning, association rules |
55 | Yasser Yasami, Majid Farahmand, Vahid Zargari |
An ARP-based Anomaly Detection Algorithm Using Hidden Markov Model in Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 69, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Address Resolution Protocol (ARP), Hidden Markov Model (HMM), Anomaly Detection |
55 | Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun |
Traffic Anomaly Detection and Characterization in the Tunisian National University Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 136-147, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Temporal Characteristics, Principal Component Analysis, Anomaly Detection |
55 | Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida |
An approach to spacecraft anomaly detection problem using kernel feature space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005, pp. 401-410, 2005, ACM, 1-59593-135-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
kernel feature space, spacecraft, von Mises Fisher distribution, principal component analysis, anomaly detection, time series data |
55 | Kalle Burbeck, Simin Nadjm-Tehrani |
ADWICE - Anomaly Detection with Real-Time Incremental Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 407-424, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Clustering, Adaptability, Real-time, Intrusion Detection, Anomaly Detection |
55 | Caleb C. Noble, Diane J. Cook |
Graph-based anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, 2003, pp. 631-636, 2003, ACM, 1-58113-737-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data mining, anomaly detection, graph regularity |
55 | R. Sekar 0001, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou |
Specification-based anomaly detection: a new approach for detecting network intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 265-274, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, network monitoring |
55 | Roy A. Maxion, Kymie M. C. Tan |
Benchmarking Anomaly-Based Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, pp. 623-630, 2000, IEEE Computer Society, 0-7695-0707-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
intrusion detection, benchmarking, Anomaly detection, computer security, empirical methods |
52 | Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan |
Using artificial anomalies to detect unknown and known network intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 6(5), pp. 507-527, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Artificial anomaly, Security, Intrusion detection, Anomaly detection |
52 | Daniela Brauckhoff, Martin May, Bernhard Plattner |
Comparison of anomaly signal quality in common detection metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, MineNet 2007, San Diego, California, USA, June 12, 2007, pp. 13-16, 2007, ACM, 978-1-59593-792-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly exposure measure, signal comparison, anomaly detection |
52 | Cheng-Fa Tsai, Chia-Chen Yen |
Unsupervised Anomaly Detection Using HDG-Clustering Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (2) ![In: Neural Information Processing, 14th International Conference, ICONIP 2007, Kitakyushu, Japan, November 13-16, 2007, Revised Selected Papers, Part II, pp. 356-365, 2007, Springer, 978-3-540-69159-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unsupervised anomaly detection, data mining, intrusion detection, anomaly detection, data clustering |
52 | George K. Baah, Alexander G. Gray, Mary Jean Harrold |
On-line anomaly detection of deployed software: a statistical machine learning approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOQUA ![In: Third International Workshop on Software Quality Assurance, SOQUA 2006, Portland, Oregon, USA, November 6, 2006, pp. 70-77, 2006, ACM, 1-59593-584-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anomaly diagnosis, machine learning, anomaly detection, Markov models, fault localization |
52 | Kymie M. C. Tan, Roy A. Maxion |
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 188-201, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anomaly detector coverage, minimal foreign sequence, stide, performance evaluation, Anomaly detection |
50 | Shashank Shanbhag, Tilman Wolf |
Massively Parallel Anomaly Detection in Online Network Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 17th International Conference on Computer Communications and Networks, IEEE ICCCN 2008, St. Thomas, U.S. Virgin Islands, August 3-7, 2008, pp. 261-266, 2008, IEEE, 978-1-4244-2390-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Xue Wang 0001, Daowei Bi, Liang Ding, Sheng Wang 0010 |
Bootstrap Gaussian Process classifiers for rotating machinery anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 1129-1134, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Roberto Perdisci, Guofei Gu, Wenke Lee |
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 488-498, 2006, IEEE Computer Society, 0-7695-2701-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | L. Lawrence Ho, Christopher J. Macey, Ronald Hiller |
A Distributed and Reliable Platform for Adaptive Anomaly Detection in IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Active Technologies for Network and Service Management, 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM '99, Zurich, Switzerland, October 11-13, 1999, Proceedings, pp. 33-46, 1999, Springer, 3-540-66598-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
48 | Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors |
Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 9th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2008, 7-9 May 2008, Sydney, NSW, Australia, pp. 266-271, 2008, IEEE Computer Society, 978-0-7695-3125-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Principal component analysis, Anomaly detection, Wireless mesh networks |
48 | Yongsu Park, Jaeheung Lee, Yookun Cho |
Intrusion Detection Using Noisy Training Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 547-556, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, intrusion detection, anomaly detection, system call |
47 | Varun Chandola, Arindam Banerjee 0001, Vipin Kumar 0001 |
Anomaly detection: A survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 41(3), pp. 15:1-15:58, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anomaly detection, outlier detection |
47 | Peng Li 0059, Debin Gao, Michael K. Reiter |
Automatically Adapting a Trained Anomaly Detector to Software Patches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 142-160, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software patches, system-call monitoring, binary difference analysis, Anomaly detection |
47 | Tao Xiang 0002, Shaogang Gong |
Video Behavior Profiling for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 30(5), pp. 893-908, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Behaviour profiling, Dynamic Scene Modelling, FeatureSelection, Anomaly Detection, Dynamic Bayesian Networks, Spectral clustering |
47 | Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck |
Incorporation of Application Layer Protocol Syntax into Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 188-202, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anomaly Detection, Web Security, Protocol Analysis |
47 | George Nychis, Vyas Sekar, David G. Andersen, Hyong Kim, Hui Zhang 0001 |
An empirical evaluation of entropy-based traffic anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, IMC 2008, Vouliagmeni, Greece, October 20-22, 2008, pp. 151-156, 2008, ACM, 978-1-60558-334-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
entropy, anomaly detection |
47 | Arnur G. Tokhtabayev, Victor A. Skormin |
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 203-208, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anomaly Propagation, Intrusion detection, Markov Models |
47 | Takeshi Okamoto, Yoshiteru Ishida |
Framework of an Immunity-Based Anomaly Detection System for User Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 821-829, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Immunity-based system, Hidden Markov model, Anomaly detection, Computer security, ROC |
47 | Quan Qian, Mingjun Xin |
Research on Hidden Markov Model for System Call Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 152-159, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Host System Calls, Hidden Markov Model, Anomaly Detection |
47 | Augustin Soule, Fernando Silveira, Haakon Ringberg, Christophe Diot |
Challenging the supremacy of traffic matrices in anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 105-110, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
traffic aggregation, anomaly detection |
47 | Adrian Spalka, Jan Lehnhardt |
A Comprehensive Approach to Anomaly Detection in Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 207-221, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
relational databases, anomaly detection, Database security, misuse detection |
47 | Xiaoshu Hang, Honghua Dai 0001 |
Applying both positive and negative selection to supervised learning for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Proceedings, Washington DC, USA, June 25-29, 2005, pp. 345-352, 2005, ACM, 1-59593-010-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
positive selection, anomaly detection, artificial immune system, supervised learning, negative selection |
47 | Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian |
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 387-396, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain |
45 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Mining anomalies using traffic feature distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005, pp. 217-228, 2005, ACM, 1-59593-009-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomaly classification, network-wide traffic analysis, anomaly detection |
45 | Stefan Skludarek, Hirosuke Yamamoto |
Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 619-626, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Unsupervised Anomaly Detection, Anomaly Detection, Time Series Analysis, Masquerade Detection, Training Data |
45 | Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro |
NADA - Network Anomaly Detection Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Virtualization of Networks and Services, 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings, pp. 191-194, 2007, Springer, 978-3-540-75693-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Traffic Anomaly Identification, Anomaly Signature |
43 | Dmitry G. Korzun, Andrei V. Gurtov |
A local equilibrium model for P2P resource ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 27-29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao |
A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 53-54, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Sipat Triukose, Zhihua Wen, Michael Rabinovich |
Content delivery networks: how big is big enough? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 59-60, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Alma Riska, Erik Riedel |
Evaluation of disk-level workloads at different time scales. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 67-68, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Ashish Kamra, Elisa Bertino, Rimma V. Nehme |
Responding to Anomalous Database Requests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 50-66, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Hongli Luo, Mei-Ling Shyu |
Provision of Quality of Service with Router Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Tenth IEEE International Symposium on Multimedia (ISM2008), December 15-17, 2008, Berkeley, California, USA, pp. 654-659, 2008, IEEE Computer Society, 978-0-7695-3454-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Shashank Shanbhag, Tilman Wolf |
Accurate anomaly detection through parallelism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 23(1), pp. 22-28, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou |
Network anomaly detection and classification via opportunistic sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 23(1), pp. 6-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 351-371, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka |
Conditional Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 19(5), pp. 631-645, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, mining methods and algorithms |
43 | Paolo Bellavista, Antonio Corradi, Luca Foschini 0001 |
Context-Aware Multimedia Middleware Solutions for Counteracting IEEE 802.11 Performance Anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 9-16, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Ye Wang, Hussein M. Abdel-Wahab |
A Multilayer Approach of Anomaly Detection for Email Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 48-53, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Carrie Gates, Carol Taylor |
Challenging the anomaly detection paradigm: a provocative discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006, pp. 21-29, 2006, ACM, 978-1-59593-923-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, intrusion detection |
43 | Christoph C. Michael |
Finding the Vocabulary of Program Behavior Data for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 152-163, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion |
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 54-73, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina |
Detection and identification of network anomalies using sketch subspaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 147-152, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defeat, anomaly detection, sketch, subspace method |
41 | Gaurav Tandon, Philip K. Chan, Debasis Mitra 0003 |
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 16-25, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data cleaning, motifs |
40 | Pedro Henriques dos Santos Teixeira, Ruy Luiz Milidiú |
Data stream anomaly detection through principal subspace tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1609-1616, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data streams, anomaly detection, time series, dimensionality reduction, unsupervised learning |
40 | Hwa-Ju Lee, Kyung-Sook Lee, Ihn-Han Bae |
A weighted-dissimilarity-based anomaly detection method for mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 108-113, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, mobile wireless networks, dissimilarity |
40 | Marcus Chang, Andreas Terzis, Philippe Bonnet |
Mote-Based Online Anomaly Detection Using Echo State Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCOSS ![In: Distributed Computing in Sensor Systems, 5th IEEE International Conference, DCOSS 2009, Marina del Rey, CA, USA, June 8-10, 2009. Proceedings, pp. 72-86, 2009, Springer, 978-3-642-02084-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Real-time, Anomaly detection |
40 | Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero |
Selecting and Improving System Call Models for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 206-223, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
System Call Models, Self Organizing Map, Anomaly Detection, Stochastic Models, Deterministic Models |
40 | Huijuan Lu, Jianguo Chen, Wei Wei |
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 482-487, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian networks, Anomaly detection |
40 | Oliver Obst, X. Rosalind Wang, Mikhail Prokopenko |
Using Echo State Networks for Anomaly Detection in Underground Coal Mines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 219-229, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
coal mines, sensor networks, bayesian networks, anomaly detection, recurrent neural networks, echo state networks |
40 | Yang Li 0002, Li Guo 0001 |
TCM-KNN scheme for network anomaly detection using feature-based optimizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2103-2109, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight |
40 | Salem Benferhat, Karim Tabia |
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 618-623, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anomaly detection, diagnosis, traffic profiling |
40 | Pedro Casas, Lionel Fillatre, Sandrine Vaton, Igor V. Nikiforov |
Volume Anomaly Detection in Data Networks: An Optimal Detection Algorithm vs. the PCA Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FITraMEn ![In: Traffic Management and Traffic Engineering for the Future Internet, First Euro-NF Workshop, FITraMEn 2008, Porto, Portugal, December 11-12, Revised Selected Papers, pp. 96-113, 2008, Springer, 978-3-642-04575-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network Monitoring and Traffic Analysis, Optimal Volume Anomaly Detection, Network Traffic Modeling |
40 | Jinfu Wang 0001, John Bigham |
Anomaly detection in the case of message oriented middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware Security ![In: Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, pp. 40-42, 2008, ACM, 978-1-60558-363-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, message oriented middleware, self-protection |
40 | Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen |
Network anomaly detection based on TCM-KNN algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 13-19, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TCM-KNN algorithm, machine learning, network security, anomaly detection |
40 | Kenneth L. Ingham, Anil Somayaji |
A methodology for designing accurate anomaly detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LANC ![In: Proceedings of the 4th International IFIP/ACM Latin American Networking Conference, LANC 2007, San José, Costa Rica, October 10-11, 2007, pp. 139-143, 2007, ACM, 978-1-59593-907-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
web server security, intrusion detection, anomaly detection, HTTP |
40 | Sang Hyun Oh, Won Suk Lee |
Anomaly Intrusion Detection Based on Dynamic Cluster Updating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007, Nanjing, China, May 22-25, 2007, Proceedings, pp. 737-744, 2007, Springer, 978-3-540-71700-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data Mining, Clustering, Intrusion Detection, Anomaly Detection |
40 | Prahlad Fogla, Wenke Lee |
Evading network anomaly detection systems: formal reasoning and practical techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 59-68, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
polymorphic blending attack, anomaly detection, mimicry attack |
40 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
FADS: A Fuzzy Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 792-798, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, anomaly detection, Fuzzy theory |
40 | Shrijit S. Joshi, Vir V. Phoha |
Investigating hidden Markov models capabilities in anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (1) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, USA, March 18-20, 2005, Volume 1, pp. 98-103, 2005, ACM, 1-59593-059-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomaly detection system, hidden Markov models |
40 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Gray-box extraction of execution graphs for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 318-329, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
system call monitor, intrusion detection, anomaly detection, control flow graph |
40 | John Zachary, John C. McEachen, Daniel W. Ettlich |
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 59-70, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection |
40 | Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato |
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 223-237, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix |
40 | Fabio A. González 0001, Dipankar Dasgupta |
Anomaly Detection Using Real-Valued Negative Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Genet. Program. Evolvable Mach. ![In: Genet. Program. Evolvable Mach. 4(4), pp. 383-403, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
matching rule, self-organizing maps, anomaly detection, artificial immune systems, negative selection |
40 | Albert J. Höglund, Kimmo Hätönen, Antti S. Sorvari |
A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN (5) ![In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, IJCNN 2000, Neural Computing: New Challenges and Perspectives for the New Millennium, Como, Italy, July 24-27, 2000, Volume 5, pp. 411-416, 2000, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Self-Organizing Map (SOM), anomaly detection, novelty detection, host-based intrusion detection |
40 | Ulrike Lechner, Christian Lengauer, Friederike Nickl, Martin Wirsing |
(Objects + Concurrency) & Reusability - A Proposal to Circumvent the Inheritance Anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'96 - Object-Oriented Programming, 10th European Conference, Linz, Austria, July 8-12, 1996, Proceedings, pp. 232-247, 1996, Springer, 3-540-61439-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Concurrent rewriting, parallelism, reusability, Maude, inheritance anomaly |
38 | Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka |
Detecting and Identifying Network Anomalies by Component Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 501-504, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network anomalies, Anomaly identification, Principal component analysis, Anomaly detection, Traffic analysis |
36 | Jiong Zhang, Mohammad Zulkernine, Anwar Haque |
Random-Forests-Based Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 38(5), pp. 649-659, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jiong Zhang, Mohammad Zulkernine |
A Hybrid Network Intrusion Detection Technique Using Random Forests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 262-269, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hybrid detection, Data mining, Intrusion detection, Network security, Random forests |
36 | Lobel Crnogorac, Anand S. Rao, Kotagiri Ramamohanarao |
Classifying Inheritance Mechanisms in Concurrent Object Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'98 - Object-Oriented Programming, 12th European Conference, Brussels, Belgium, July 20-24, 1998, Proceedings, pp. 571-600, 1998, Springer, 3-540-64737-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi |
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 346-347, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | See-hwan Yoo, Tae-Kyung Kim, Chuck Yoo |
Resolving Performance Anomaly Using ARF-Aware TCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEUS ![In: Software Technologies for Embedded and Ubiquitous Systems, 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008, Proceedings, pp. 209-220, 2008, Springer, 978-3-540-87784-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Junsup Lee, Sung Deok Cha |
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 404-405, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Xinguang Peng, Yanyan Zhang |
Robust Host Anomaly Detector Using Strong Isolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 575-578, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Martin Rehák, Michal Pechoucek, Martin Grill, Karel Bartos |
Trust-Based Classifier Combination for Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents XII, 12th International Workshop, CIA 2008, Prague, Czech Republic, September 10-12, 2008. Proceedings, pp. 116-130, 2008, Springer, 978-3-540-85833-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Ji Zhang, Qigang Gao, Hai H. Wang |
Anomaly detection in high-dimensional network data streams: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 251-253, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Takuo Nakashima, Shunsuke Oshima, Yusuke Nishikido, Toshinori Sueyoshi |
Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 141-147, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 16067 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|