The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Haakon Ringberg, Augustin Soule, Jennifer Rexford, Christophe Diot Sensitivity of PCA for traffic anomaly detection. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF principal component analysis, traffic engineering, network traffic analysis
36Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion Anomaly Detector Performance Evaluation Using a Parameterized Environment. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Yao Li 0002, Zhitang Li, Shuyu Liu A Fuzzy Anomaly Detection Algorithm for IPv6. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fuzzy detection, genetic algorithm, negative selection
36See-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck Yoo Eliminating the Performance Anomaly of 802.11b. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Detection, Principal Component Analysis, Vector Quantization, Multivariate Data Analysis
36Zonghua Zhang, Hong Shen 0001 A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Kalle Burbeck Current Research and Use of Anomaly Detection. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36John Bigham, David Gamez, Ning Lu Safeguarding SCADA Systems with Anomaly Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee, Vishal Misra, Jitendra Padhye, Dan Rubenstein, Yan Yu Opportunistic use of client repeaters to improve performance of WLANs. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rate anomaly, wireless, IEEE 802.11
33Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna Protecting a Moving Target: Addressing Web Application Concept Drift. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Machine Learning, Anomaly Detection, Concept Drift, Web Application Security
33Anton Babenko, Leonardo Mariani, Fabrizio Pastore AVA: automated interpretation of dynamically detected anomalies. Search on Bibsonomy ISSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, dynamic analysis
33Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie Towards Incorporating Discrete-Event Systems in Secure Software Development. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly detection, Software security, discrete-event systems, finite-state automata
33Damiano Bolzoni, Sandro Etalle Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly detection, intrusion detection systems, regular languages, Web application security
33Rosario Giuseppe Garroppo, Stefano Giordano, Stefano Lucetti, Luca Tavanti Providing air-time usage fairness in IEEE 802.11 networks with the deficit transmission time (DTT) scheduler. Search on Bibsonomy Wirel. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Channel-aware scheduler, Traffic flows isolation, IEEE 802.11, Max-min fairness, Proportional fairness, Performance anomaly
33Piero P. Bonissone, Naresh Iyer Soft Computing Applications to Prognostics and Health Management (PHM): Leveraging Field Data and Domain Knowledge. Search on Bibsonomy IWANN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Prognostics and Health Management, PHM, Prognostics, Remaining life, Soft Computing Applications, Classification, Predictions, Decision Support Systems, Anomaly Detection, Fusion, Diagnostics
33Hilmi Günes Kayacik, Nur Zincir-Heywood On the Contribution of Preamble to Information Hiding in Mimicry Attacks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benchmarking, anomaly detection, Information hiding
33Sean Patrick Murphy, Howard S. Burkom Decoupling Temporal Aberration Detection Algorithms for Enhanced Biosurveillance. Search on Bibsonomy BioSurveillance The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, time series, biosurveillance
33Duck-Yong Yang, Tae-Jin Lee, Kyunghun Jang, Jin-Bong Chang, Sunghyun Choi 0001 Performance Enhancement of Multirate IEEE 802.11 WLANs with Geographically Scattered Stations. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11a/b/g, throughput, CSMA/CA, DCF, link adaptation, Backoff algorithm, performance anomaly
33Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tieniu Tan, Stephen J. Maybank A System for Learning Statistical Motion Patterns. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tracking multiple objects, learning statistical motion patterns, behavior understanding, anomaly detection
33Carla Marceau, Matthew Stillerman Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dynamic link libraries, intrusion detection, Anomaly detection, shared libraries, behavior profile
33Eamonn J. Keogh, Jessica Lin 0001, Ada Wai-Chee Fu HOT SAX: Efficiently Finding the Most Unusual Time Series Subsequence. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Time Series Data Mining, Clustering, Anomaly Detection
33Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, Chad R. Frost, Doron Tal Identifying Contingency Requirements Using Obstacle Analysis. Search on Bibsonomy RE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF contingency requirements, obstacle analysis, anomaly-handling, autonomy, safety-critical software, requirements evolution
33Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
33Sang-Jun Han, Sung-Bae Cho Combining Multiple Host-Based Detectors Using Decision Tree. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combining detectors, decision tree, anomaly detection
33Ioannis Ch. Paschalidis, Georgios Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF method of types, statistical anomaly detection, network security, Markov processes, large deviations
33Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata, Ryohei Fujimaki Network anomaly detection based on Eigen equation compression. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Eigen equation compression, network anomaly detection
33Yu-Shu Chen, Yi-Ming Chen Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IHMM, anomaly intrusion detection, normal profile, adaboost
33Nawa Ngamwitthayanon, Naruemon Wattanapongsakorn, David W. Coit Investigation of Fuzzy Adaptive Resonance Theory in Network Anomaly Intrusion Detection. Search on Bibsonomy ISNN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF One Shot Fast Learning, Intrusion Detection, Adaptive Learning, Network Anomaly Detection, Fuzzy-Adaptive Resonance Theory
33Julien Rabatel, Sandra Bringay, Pascal Poncelet SO_MAD: SensOr Mining for Anomaly Detection in Railway Data. Search on Bibsonomy ICDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF behavior characterization, anomaly detection, sequential patterns
33Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack classification, anomaly-based intrusion detection systems
33Giuseppe Bianchi 0001, Simone Teofili, Matteo Pomposini New directions in privacy-preserving anomaly detection for network traffic. Search on Bibsonomy NDA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF counting bloom filters, anomaly detection, privacy-preserving, traffic measurement
33Marius Kloft, Ulf Brefeld, Patrick Düssel, Christian Gehl, Pavel Laskov Automatic feature selection for anomaly detection. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine learning, feature selection, intrusion detection, network security, anomaly detection, multiple kernel learning, support vector data description
33Kaustav Das, Jeff G. Schneider, Daniel B. Neill Anomaly pattern detection in categorical datasets. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine learning, anomaly detection, pattern detection
33Shelly Xiaonan Wu, Wolfgang Banzhaf Combatting financial fraud: a coevolutionary anomaly detection approach. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF financial fraud, parisian approach, self-nonself space pattern construction, fuzzy logic, anomaly detection, ecology, coevolutionary algorithms
33Mário Antunes 0002, Manuel Eduardo Correia TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection. Search on Bibsonomy IWPACBB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tunable activation threshold, anomaly detection, artificial immune system, network intrusion detection
33Bojan Jakimovski, Erik Maehle Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robot anomaly detection, robot fault detection, fault tolerant robot, six legged robot, artificial immune system, self-healing, clonal selection, self-reconfiguration
33Pablo García Bringas, Yoseba K. Penya Next-Generation Misuse and Anomaly Prevention System. Search on Bibsonomy ICEIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection
33Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF receiver operating characteristic (ROC) curves, classification, decision trees, Anomaly detection, k-Means clustering
33Kenneth L. Ingham, Hajime Inoue Comparing Anomaly Detection Techniques for HTTP. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hypertext transport protocol, Intrusion detection, Anomaly detection, HTTP, Comparison
33Costantina Caruso, Donato Malerba A Data Mining Methodology for Anomaly Detection in Network Data. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ranking anomalies, decision boundary, event monitoring, data mining, machine learning, Anomaly detection, adaptive model, network traffic analysis
33Koohong Kang Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Traffic Anomaly, Network Traffic Distribution, Entropy, DoS
33Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura A Hybrid Command Sequence Model for Anomaly Detection. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Command sequence, User model, Anomaly detection, Computer security, IDS, GA
33Gang Lu, Junkai Yi, Kevin Lü 0001 A dubiety-determining based model for database cumulated anomaly intrusion. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly intrusion, intrusion detection, database security
33Solahuddin B. Shamsuddin, Michael E. Woodward Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data base, Anomaly, Network Intrusion Detection System
33Luís M. A. Bettencourt, Ruy M. Ribeiro, Gerardo Chowell, Timothy Lant, Carlos Castillo-Chavez Towards Real Time Epidemiology: Data Assimilation, Modeling and Anomaly Detection of Health Surveillance Data Streams. Search on Bibsonomy BioSurveillance The full citation details ... 2007 DBLP  DOI  BibTeX  RDF real time epidemiology, anomaly detection, surveillance, Bayesian inference, interactive visualization, data assimilation
33Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda An anomaly-driven reverse proxy for web applications. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, data distribution, web proxy
33Bruce D. Caulkins, Joohan Lee, Morgan C. Wang Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND). Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system, bootstrapping
33Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry Immune anomaly detection enhanced with evolutionary paradigms. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF artificial immune systems, coevolution, network anomaly detection
33Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee Anomaly Intrusion Detection Based on Clustering a Data Stream. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining, Clustering, Intrusion detection, Data stream, Anomaly detection
33Tahiry Razafindralambo, Isabelle Guérin Lassous, Luigi Iannone, Serge Fdida Dynamic packet aggregation to solve performance anomaly in 802.11 wireless networks. Search on Bibsonomy MSWiM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF algorithms, 802.11, performance anomaly
33Trishul M. Chilimbi, Vinod Ganapathy HeapMD: identifying heap-based bugs using anomaly detection. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, debugging, anomaly detection, bugs, heap
33Julie Greensmith, Uwe Aickelin, Steve Cayzer Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. Search on Bibsonomy ICARIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly detection, artificial immune systems, Danger Theory, dendritic cells
33Franciszek Seredynski, Pascal Bouvry Some Issues in Solving the Anomaly Detection Problem using Immunological Approach. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF detector generation, protocols, anomaly detection, computer networks, artificial immune system
33Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, Claudia Eckert 0001 Is negative selection appropriate for anomaly detection? Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF positive selection, anomaly detection, artificial immune systems, negative selection, one-class SVM
33Xinguang Peng, Kaifeng Ren Anomaly Detection with High Deviations for System Security. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privileged programs, Anomaly detection, System security
33Min Qin, Kai Hwang 0001 Frequent Episode Rules for Internet Anomaly Detection. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traffic datamining, Grid computing, intrusion detection, Network security, anomaly detection, false alarms
33Giuseppe Milicia, Vladimiro Sassone The inheritance anomaly: ten years after. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF concurrent programming, inheritance anomaly
33Christopher Krügel, Giovanni Vigna Anomaly detection of web-based attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF world-wide web, network security, anomaly detection
33Christopher Krügel, Thomas Toth, Engin Kirda Service specific anomaly detection for network intrusion detection. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly eetection, intrusion eetection, network security
33Jun Li, Constantine N. Manikopoulos Network Fault Detection: Classifier Training Method for Anomaly Fault Detection in a Production Network Using Test Network Information. Search on Bibsonomy LCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet, Anomaly detection, Network Management, Fault Management
33L. Lawrence Ho, Symeon Papavassiliou Network and Service Anomaly Detection in Multi-Service Transaction-Based Electronic Commerce Wide Area Networks. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF proactive network management, network/service anomaly detection, electronic commerce networks
33Terran Lane, Carla E. Brodley Temporal Sequence Learning and Data Reduction for Anomaly Detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF clustering, machine learning, anomaly detection, user profiling, empirical evaluation, data reduction, instance based learning
33Barry C. L. Leung, Peter P. K. Chiu Behaviour Equation as Solution of Inheritance Anomaly in Concurrent Object-Oriented Programming Languages. Search on Bibsonomy PDP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF behaviour equation, concurrent object-oriented programming languages, synchronisation code reuse, super class, object-based concurrency, parallel programming, object-oriented programming, inheritance, inheritance anomaly, concurrent object
31Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan A neuro-immune model for discriminating and visualizing anomalies. Search on Bibsonomy Nat. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly visualization, neural networks, self-organizing maps, anomaly detection, artificial immune systems, negative selection, dynamic learning
30Frédéric Majorczyk, Eric Totel, Ludovic Mé, Ayda Saïdane Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF COTS diversity, anomaly diagnosis, graph similarity, anomaly detection, design diversity
29Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Kiran S. Balagani, Vir V. Phoha, Gopi K. Kuchimanchi A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Youngseok Lee 0002, Seongho Shin, Taeck-Geun Kwon Signature-Aware Traffic Monitoring with IPFIX. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF flow and security, signature, traffic measurement, IPFIX
29Ada Wai-Chee Fu, Oscar Tat-Wing Leung, Eamonn J. Keogh, Jessica Lin 0001 Finding Time Series Discords Based on Haar Transform. Search on Bibsonomy ADMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Robyn R. Lutz, Ines Carmen Mikulski Empirical Analysis of Safety-Critical Anomalies During Operations. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Software and system safety, diagnostics, product metrics, maintenance process
29Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna On the Detection of Anomalous System Call Arguments. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Zhuowei Li 0001, Amitabha Das, Sukumar Nandi Utilizing Statistical Characteristics of N-grams for Intrusion Detection. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Paul Barford, Jeffery Kline, David Plonka, Amos Ron A signal analysis of network traffic anomalies. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Somesh Jha, Kymie M. C. Tan, Roy A. Maxion Markov Chains, Classifiers, and Intrusion Detection. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Marc Dacier, O. Sami Saydjari Special Seminar: Intrusion Detection. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Rongquen Chen, Weiyi Meng Precise Detection and Proper Handling of View Maintenance Anomalies in a Multidatabase Environment. Search on Bibsonomy CoopIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29Nick D. L. Owens, Andrew J. Greensted, Jon Timmis, Andrew M. Tyrrell T Cell Receptor Signalling Inspired Kernel Density Estimation and Anomaly Detection. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Tian-Shya Ma Real-time anomaly detection for traveling individuals. Search on Bibsonomy ASSETS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF emergency notification, ubiquitous computing, assistive technology, location awareness, deviation detection
29Ihn-Han Bae, Stephan Olariu A Weighted-Dissimilarity-Based Anomaly Detection Method for Mobile Wireless Networks. Search on Bibsonomy CSE (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Justin Zhan, B. John Oommen, Johanna Crisostomo Anomaly Detection in Dynamic Social Systems Using Weak Estimators. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Haakon Ringberg, Matthew Roughan, Jennifer Rexford The need for simulation in evaluating anomaly detectors. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Ryohei Fujimaki Anomaly Detection Support Vector Machine and Its Application to Fault Diagnosis. Search on Bibsonomy ICDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Michelangelo Ceci, Annalisa Appice, Costantina Caruso, Donato Malerba Discovering Emerging Patterns for Anomaly Detection in Network Connection Data. Search on Bibsonomy ISMIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Taketoshi Mori, Ryo Urushibata, Masamichi Shimosaka, Hiroshi Noguchi, Tomomasa Sato Anomaly detection algorithm based on life pattern extraction from accumulated pyroelectric sensor data. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Liwei Kuang, Mohammad Zulkernine An anomaly intrusion detection method using the CSI-KNN algorithm. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CSI-KNN algorithm, machine learning, intrusion detection
29Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei Chen, Jeffrey Saltzman 0002, David A. Ross, Stacey Szymanski, Anil Tarachandani, Mahadev Satyanarayanan Distributed online anomaly detection in high-content screening. Search on Bibsonomy ISBI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Chaoli Cai, Ajay Gupta Mobility-Pattern-Based Anomaly Detection Algorithm in Mobile Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Matthias Reif, Markus Goldstein, Armin Stahl, Thomas M. Breuel Anomaly detection by combining decision trees and parametric densities. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Ioannis Ch. Paschalidis, Yin Chen Anomaly detection in sensor networks based on large deviations of Markov chain models. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29X. Rosalind Wang, Joseph T. Lizier, Oliver Obst, Mikhail Prokopenko, Peter Wang Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yasser Yasami, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella Distributed Spatial Anomaly Detection. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Cairong Yan, Zhidong Qin, Youqun Shi Sequence Analysis and Anomaly Detection of Web Service Composition. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Na Luo, Fuyu Yuan, Wanli Zuo, Fengling He, Zhiguo Zhou Improved Unsupervised Anomaly Detection Algorithm. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Xiao Hu, Raj Subbu, Piero P. Bonissone, Hai Qiu, Naresh Iyer Multivariate anomaly detection in real-world industrial systems. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Hai Qiu, Neil H. W. Eklund, Xiao Hu, Weizhong Yan, Naresh Iyer Anomaly detection using data clustering and neural networks. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Amit Banerjee, Philippe Burlina, Reuven Meth Fast Hyperspectral Anomaly Detection via SVDD. Search on Bibsonomy ICIP (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu Anomaly-Based Behavior Analysis of Wireless Network Security. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license