|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Haakon Ringberg, Augustin Soule, Jennifer Rexford, Christophe Diot |
Sensitivity of PCA for traffic anomaly detection. |
SIGMETRICS |
2007 |
DBLP DOI BibTeX RDF |
principal component analysis, traffic engineering, network traffic analysis |
36 | Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion |
Anomaly Detector Performance Evaluation Using a Parameterized Environment. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Yao Li 0002, Zhitang Li, Shuyu Liu |
A Fuzzy Anomaly Detection Algorithm for IPv6. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
fuzzy detection, genetic algorithm, negative selection |
36 | See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck Yoo |
Eliminating the Performance Anomaly of 802.11b. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn |
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Principal Component Analysis, Vector Quantization, Multivariate Data Analysis |
36 | Zonghua Zhang, Hong Shen 0001 |
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Kalle Burbeck |
Current Research and Use of Anomaly Detection. |
WETICE |
2005 |
DBLP DOI BibTeX RDF |
|
36 | John Bigham, David Gamez, Ning Lu |
Safeguarding SCADA Systems with Anomaly Detection. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee, Vishal Misra, Jitendra Padhye, Dan Rubenstein, Yan Yu |
Opportunistic use of client repeaters to improve performance of WLANs. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
rate anomaly, wireless, IEEE 802.11 |
33 | Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna |
Protecting a Moving Target: Addressing Web Application Concept Drift. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
Machine Learning, Anomaly Detection, Concept Drift, Web Application Security |
33 | Anton Babenko, Leonardo Mariani, Fabrizio Pastore |
AVA: automated interpretation of dynamically detected anomalies. |
ISSTA |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, dynamic analysis |
33 | Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie |
Towards Incorporating Discrete-Event Systems in Secure Software Development. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
anomaly detection, Software security, discrete-event systems, finite-state automata |
33 | Damiano Bolzoni, Sandro Etalle |
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
anomaly detection, intrusion detection systems, regular languages, Web application security |
33 | Rosario Giuseppe Garroppo, Stefano Giordano, Stefano Lucetti, Luca Tavanti |
Providing air-time usage fairness in IEEE 802.11 networks with the deficit transmission time (DTT) scheduler. |
Wirel. Networks |
2007 |
DBLP DOI BibTeX RDF |
Channel-aware scheduler, Traffic flows isolation, IEEE 802.11, Max-min fairness, Proportional fairness, Performance anomaly |
33 | Piero P. Bonissone, Naresh Iyer |
Soft Computing Applications to Prognostics and Health Management (PHM): Leveraging Field Data and Domain Knowledge. |
IWANN |
2007 |
DBLP DOI BibTeX RDF |
Prognostics and Health Management, PHM, Prognostics, Remaining life, Soft Computing Applications, Classification, Predictions, Decision Support Systems, Anomaly Detection, Fusion, Diagnostics |
33 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
On the Contribution of Preamble to Information Hiding in Mimicry Attacks. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
benchmarking, anomaly detection, Information hiding |
33 | Sean Patrick Murphy, Howard S. Burkom |
Decoupling Temporal Aberration Detection Algorithms for Enhanced Biosurveillance. |
BioSurveillance |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, time series, biosurveillance |
33 | Duck-Yong Yang, Tae-Jin Lee, Kyunghun Jang, Jin-Bong Chang, Sunghyun Choi 0001 |
Performance Enhancement of Multirate IEEE 802.11 WLANs with Geographically Scattered Stations. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
IEEE 802.11a/b/g, throughput, CSMA/CA, DCF, link adaptation, Backoff algorithm, performance anomaly |
33 | Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tieniu Tan, Stephen J. Maybank |
A System for Learning Statistical Motion Patterns. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2006 |
DBLP DOI BibTeX RDF |
Tracking multiple objects, learning statistical motion patterns, behavior understanding, anomaly detection |
33 | Carla Marceau, Matthew Stillerman |
Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
dynamic link libraries, intrusion detection, Anomaly detection, shared libraries, behavior profile |
33 | Eamonn J. Keogh, Jessica Lin 0001, Ada Wai-Chee Fu |
HOT SAX: Efficiently Finding the Most Unusual Time Series Subsequence. |
ICDM |
2005 |
DBLP DOI BibTeX RDF |
Time Series Data Mining, Clustering, Anomaly Detection |
33 | Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, Chad R. Frost, Doron Tal |
Identifying Contingency Requirements Using Obstacle Analysis. |
RE |
2005 |
DBLP DOI BibTeX RDF |
contingency requirements, obstacle analysis, anomaly-handling, autonomy, safety-critical software, requirements evolution |
33 | Eric Totel, Frédéric Majorczyk, Ludovic Mé |
COTS Diversity Based Intrusion Detection and Application to Web Servers. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
COTS diversity, Intrusion detection, anomaly detection, design diversity |
33 | Sang-Jun Han, Sung-Bae Cho |
Combining Multiple Host-Based Detectors Using Decision Tree. |
Australian Conference on Artificial Intelligence |
2003 |
DBLP DOI BibTeX RDF |
combining detectors, decision tree, anomaly detection |
33 | Ioannis Ch. Paschalidis, Georgios Smaragdakis |
Spatio-temporal network anomaly detection by assessing deviations of empirical measures. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
method of types, statistical anomaly detection, network security, Markov processes, large deviations |
33 | Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata, Ryohei Fujimaki |
Network anomaly detection based on Eigen equation compression. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
Eigen equation compression, network anomaly detection |
33 | Yu-Shu Chen, Yi-Ming Chen |
Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
IHMM, anomaly intrusion detection, normal profile, adaboost |
33 | Nawa Ngamwitthayanon, Naruemon Wattanapongsakorn, David W. Coit |
Investigation of Fuzzy Adaptive Resonance Theory in Network Anomaly Intrusion Detection. |
ISNN (2) |
2009 |
DBLP DOI BibTeX RDF |
One Shot Fast Learning, Intrusion Detection, Adaptive Learning, Network Anomaly Detection, Fuzzy-Adaptive Resonance Theory |
33 | Julien Rabatel, Sandra Bringay, Pascal Poncelet |
SO_MAD: SensOr Mining for Anomaly Detection in Railway Data. |
ICDM |
2009 |
DBLP DOI BibTeX RDF |
behavior characterization, anomaly detection, sequential patterns |
33 | Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel |
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
attack classification, anomaly-based intrusion detection systems |
33 | Giuseppe Bianchi 0001, Simone Teofili, Matteo Pomposini |
New directions in privacy-preserving anomaly detection for network traffic. |
NDA |
2008 |
DBLP DOI BibTeX RDF |
counting bloom filters, anomaly detection, privacy-preserving, traffic measurement |
33 | Marius Kloft, Ulf Brefeld, Patrick Düssel, Christian Gehl, Pavel Laskov |
Automatic feature selection for anomaly detection. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
machine learning, feature selection, intrusion detection, network security, anomaly detection, multiple kernel learning, support vector data description |
33 | Kaustav Das, Jeff G. Schneider, Daniel B. Neill |
Anomaly pattern detection in categorical datasets. |
KDD |
2008 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection, pattern detection |
33 | Shelly Xiaonan Wu, Wolfgang Banzhaf |
Combatting financial fraud: a coevolutionary anomaly detection approach. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
financial fraud, parisian approach, self-nonself space pattern construction, fuzzy logic, anomaly detection, ecology, coevolutionary algorithms |
33 | Mário Antunes 0002, Manuel Eduardo Correia |
TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection. |
IWPACBB |
2008 |
DBLP DOI BibTeX RDF |
tunable activation threshold, anomaly detection, artificial immune system, network intrusion detection |
33 | Bojan Jakimovski, Erik Maehle |
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
Robot anomaly detection, robot fault detection, fault tolerant robot, six legged robot, artificial immune system, self-healing, clonal selection, self-reconfiguration |
33 | Pablo García Bringas, Yoseba K. Penya |
Next-Generation Misuse and Anomaly Prevention System. |
ICEIS |
2008 |
DBLP DOI BibTeX RDF |
Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection |
33 | Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani |
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
receiver operating characteristic (ROC) curves, classification, decision trees, Anomaly detection, k-Means clustering |
33 | Kenneth L. Ingham, Hajime Inoue |
Comparing Anomaly Detection Techniques for HTTP. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison |
33 | Costantina Caruso, Donato Malerba |
A Data Mining Methodology for Anomaly Detection in Network Data. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
ranking anomalies, decision boundary, event monitoring, data mining, machine learning, Anomaly detection, adaptive model, network traffic analysis |
33 | Koohong Kang |
Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
Network Traffic Anomaly, Network Traffic Distribution, Entropy, DoS |
33 | Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura |
A Hybrid Command Sequence Model for Anomaly Detection. |
PAKDD |
2007 |
DBLP DOI BibTeX RDF |
Command sequence, User model, Anomaly detection, Computer security, IDS, GA |
33 | Gang Lu, Junkai Yi, Kevin Lü 0001 |
A dubiety-determining based model for database cumulated anomaly intrusion. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
anomaly intrusion, intrusion detection, database security |
33 | Solahuddin B. Shamsuddin, Michael E. Woodward |
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Data base, Anomaly, Network Intrusion Detection System |
33 | Luís M. A. Bettencourt, Ruy M. Ribeiro, Gerardo Chowell, Timothy Lant, Carlos Castillo-Chavez |
Towards Real Time Epidemiology: Data Assimilation, Modeling and Anomaly Detection of Health Surveillance Data Streams. |
BioSurveillance |
2007 |
DBLP DOI BibTeX RDF |
real time epidemiology, anomaly detection, surveillance, Bayesian inference, interactive visualization, data assimilation |
33 | Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda |
An anomaly-driven reverse proxy for web applications. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, data distribution, web proxy |
33 | Bruce D. Caulkins, Joohan Lee, Morgan C. Wang |
Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND). |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system, bootstrapping |
33 | Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry |
Immune anomaly detection enhanced with evolutionary paradigms. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
artificial immune systems, coevolution, network anomaly detection |
33 | Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee |
Anomaly Intrusion Detection Based on Clustering a Data Stream. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Data mining, Clustering, Intrusion detection, Data stream, Anomaly detection |
33 | Tahiry Razafindralambo, Isabelle Guérin Lassous, Luigi Iannone, Serge Fdida |
Dynamic packet aggregation to solve performance anomaly in 802.11 wireless networks. |
MSWiM |
2006 |
DBLP DOI BibTeX RDF |
algorithms, 802.11, performance anomaly |
33 | Trishul M. Chilimbi, Vinod Ganapathy |
HeapMD: identifying heap-based bugs using anomaly detection. |
ASPLOS |
2006 |
DBLP DOI BibTeX RDF |
metrics, debugging, anomaly detection, bugs, heap |
33 | Julie Greensmith, Uwe Aickelin, Steve Cayzer |
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. |
ICARIS |
2005 |
DBLP DOI BibTeX RDF |
anomaly detection, artificial immune systems, Danger Theory, dendritic cells |
33 | Franciszek Seredynski, Pascal Bouvry |
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
detector generation, protocols, anomaly detection, computer networks, artificial immune system |
33 | Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, Claudia Eckert 0001 |
Is negative selection appropriate for anomaly detection? |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
positive selection, anomaly detection, artificial immune systems, negative selection, one-class SVM |
33 | Xinguang Peng, Kaifeng Ren |
Anomaly Detection with High Deviations for System Security. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
Privileged programs, Anomaly detection, System security |
33 | Min Qin, Kai Hwang 0001 |
Frequent Episode Rules for Internet Anomaly Detection. |
NCA |
2004 |
DBLP DOI BibTeX RDF |
traffic datamining, Grid computing, intrusion detection, Network security, anomaly detection, false alarms |
33 | Giuseppe Milicia, Vladimiro Sassone |
The inheritance anomaly: ten years after. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
concurrent programming, inheritance anomaly |
33 | Christopher Krügel, Giovanni Vigna |
Anomaly detection of web-based attacks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
world-wide web, network security, anomaly detection |
33 | Christopher Krügel, Thomas Toth, Engin Kirda |
Service specific anomaly detection for network intrusion detection. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
anomaly eetection, intrusion eetection, network security |
33 | Jun Li, Constantine N. Manikopoulos |
Network Fault Detection: Classifier Training Method for Anomaly Fault Detection in a Production Network Using Test Network Information. |
LCN |
2002 |
DBLP DOI BibTeX RDF |
Internet, Anomaly detection, Network Management, Fault Management |
33 | L. Lawrence Ho, Symeon Papavassiliou |
Network and Service Anomaly Detection in Multi-Service Transaction-Based Electronic Commerce Wide Area Networks. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
proactive network management, network/service anomaly detection, electronic commerce networks |
33 | Terran Lane, Carla E. Brodley |
Temporal Sequence Learning and Data Reduction for Anomaly Detection. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
clustering, machine learning, anomaly detection, user profiling, empirical evaluation, data reduction, instance based learning |
33 | Barry C. L. Leung, Peter P. K. Chiu |
Behaviour Equation as Solution of Inheritance Anomaly in Concurrent Object-Oriented Programming Languages. |
PDP |
1996 |
DBLP DOI BibTeX RDF |
behaviour equation, concurrent object-oriented programming languages, synchronisation code reuse, super class, object-based concurrency, parallel programming, object-oriented programming, inheritance, inheritance anomaly, concurrent object |
31 | Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan |
A neuro-immune model for discriminating and visualizing anomalies. |
Nat. Comput. |
2006 |
DBLP DOI BibTeX RDF |
anomaly visualization, neural networks, self-organizing maps, anomaly detection, artificial immune systems, negative selection, dynamic learning |
30 | Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saïdane |
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
COTS diversity, anomaly diagnosis, graph similarity, anomaly detection, design diversity |
29 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Kiran S. Balagani, Vir V. Phoha, Gopi K. Kuchimanchi |
A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Youngseok Lee 0002, Seongho Shin, Taeck-Geun Kwon |
Signature-Aware Traffic Monitoring with IPFIX. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
flow and security, signature, traffic measurement, IPFIX |
29 | Ada Wai-Chee Fu, Oscar Tat-Wing Leung, Eamonn J. Keogh, Jessica Lin 0001 |
Finding Time Series Discords Based on Haar Transform. |
ADMA |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Robyn R. Lutz, Ines Carmen Mikulski |
Empirical Analysis of Safety-Critical Anomalies During Operations. |
IEEE Trans. Software Eng. |
2004 |
DBLP DOI BibTeX RDF |
Software and system safety, diagnostics, product metrics, maintenance process |
29 | Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna |
On the Detection of Anomalous System Call Arguments. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Zhuowei Li 0001, Amitabha Das, Sukumar Nandi |
Utilizing Statistical Characteristics of N-grams for Intrusion Detection. |
CW |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Paul Barford, Jeffery Kline, David Plonka, Amos Ron |
A signal analysis of network traffic anomalies. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Somesh Jha, Kymie M. C. Tan, Roy A. Maxion |
Markov Chains, Classifiers, and Intrusion Detection. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Marc Dacier, O. Sami Saydjari |
Special Seminar: Intrusion Detection. |
FTCS |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Rongquen Chen, Weiyi Meng |
Precise Detection and Proper Handling of View Maintenance Anomalies in a Multidatabase Environment. |
CoopIS |
1997 |
DBLP DOI BibTeX RDF |
|
29 | Nick D. L. Owens, Andrew J. Greensted, Jon Timmis, Andrew M. Tyrrell |
T Cell Receptor Signalling Inspired Kernel Density Estimation and Anomaly Detection. |
ICARIS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Tian-Shya Ma |
Real-time anomaly detection for traveling individuals. |
ASSETS |
2009 |
DBLP DOI BibTeX RDF |
emergency notification, ubiquitous computing, assistive technology, location awareness, deviation detection |
29 | Ihn-Han Bae, Stephan Olariu |
A Weighted-Dissimilarity-Based Anomaly Detection Method for Mobile Wireless Networks. |
CSE (1) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Justin Zhan, B. John Oommen, Johanna Crisostomo |
Anomaly Detection in Dynamic Social Systems Using Weak Estimators. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Haakon Ringberg, Matthew Roughan, Jennifer Rexford |
The need for simulation in evaluating anomaly detectors. |
Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ryohei Fujimaki |
Anomaly Detection Support Vector Machine and Its Application to Fault Diagnosis. |
ICDM |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Michelangelo Ceci, Annalisa Appice, Costantina Caruso, Donato Malerba |
Discovering Emerging Patterns for Anomaly Detection in Network Connection Data. |
ISMIS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Taketoshi Mori, Ryo Urushibata, Masamichi Shimosaka, Hiroshi Noguchi, Tomomasa Sato |
Anomaly detection algorithm based on life pattern extraction from accumulated pyroelectric sensor data. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Liwei Kuang, Mohammad Zulkernine |
An anomaly intrusion detection method using the CSI-KNN algorithm. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
CSI-KNN algorithm, machine learning, intrusion detection |
29 | Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei Chen, Jeffrey Saltzman 0002, David A. Ross, Stacey Szymanski, Anil Tarachandani, Mahadev Satyanarayanan |
Distributed online anomaly detection in high-content screening. |
ISBI |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Chaoli Cai, Ajay Gupta |
Mobility-Pattern-Based Anomaly Detection Algorithm in Mobile Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Matthias Reif, Markus Goldstein, Armin Stahl, Thomas M. Breuel |
Anomaly detection by combining decision trees and parametric densities. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ioannis Ch. Paschalidis, Yin Chen |
Anomaly detection in sensor networks based on large deviations of Markov chain models. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | X. Rosalind Wang, Joseph T. Lizier, Oliver Obst, Mikhail Prokopenko, Peter Wang |
Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks. |
EWSN |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yasser Yasami, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian |
An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella |
Distributed Spatial Anomaly Detection. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Cairong Yan, Zhidong Qin, Youqun Shi |
Sequence Analysis and Anomaly Detection of Web Service Composition. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Na Luo, Fuyu Yuan, Wanli Zuo, Fengling He, Zhiguo Zhou |
Improved Unsupervised Anomaly Detection Algorithm. |
RSKT |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Xiao Hu, Raj Subbu, Piero P. Bonissone, Hai Qiu, Naresh Iyer |
Multivariate anomaly detection in real-world industrial systems. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Hai Qiu, Neil H. W. Eklund, Xiao Hu, Weizhong Yan, Naresh Iyer |
Anomaly detection using data clustering and neural networks. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Amit Banerjee, Philippe Burlina, Reuven Meth |
Fast Hyperspectral Anomaly Detection via SVDD. |
ICIP (4) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu |
Anomaly-Based Behavior Analysis of Wireless Network Security. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 16067 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|