The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomalies with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1984 (16) 1985-1988 (17) 1989-1991 (17) 1992-1994 (25) 1995 (18) 1996-1997 (24) 1998 (20) 1999 (26) 2000 (23) 2001 (41) 2002 (52) 2003 (42) 2004 (81) 2005 (126) 2006 (155) 2007 (173) 2008 (181) 2009 (151) 2010 (83) 2011 (73) 2012 (85) 2013 (84) 2014 (88) 2015 (104) 2016 (110) 2017 (120) 2018 (145) 2019 (188) 2020 (207) 2021 (275) 2022 (286) 2023 (279) 2024 (63)
Publication types (Num. hits)
article(1246) data(1) incollection(15) inproceedings(2005) phdthesis(111)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1254 occurrences of 806 keywords

Results
Found 3378 publication records. Showing 3378 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Yanpo Song, Ying Tang, Xiaoqi Peng, Wen Wang, Lu Tang An Approach Based on Wavelet Analysis and Non-linear Mapping to Detect Anomalies in Dataset. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19William Eberle, Lawrence B. Holder Detecting Anomalies in Cargo Using Graph Properties. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Bernd Burgstaller, Johann Blieberger, Robert Mittermayr Static Detection of Access Anomalies in Ada95. Search on Bibsonomy Ada-Europe The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Stan Salvador, Philip Chan 0001 Learning States and Rules for Detecting Anomalies in Time Series. Search on Bibsonomy Appl. Intell. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF clustering, segmentation, anomaly detection, time series, cluster validation
19Jesse D. Walters, Thomas L. Casavant, John P. Robinson, Thomas B. Bair, Terry A. Braun, Todd E. Scheetz XenoCluster: A Grid Computing Approach to Finding Ancient Evolutionary Genetic Anomalies. Search on Bibsonomy PaCT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Osamu Akashi, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Mitsuru Maruyama, Toshiharu Sugawara Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents. Search on Bibsonomy DSOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Fabrice Gadaud, M. Blanc, F. Combeau An adaptive instrumented node for efficient anomalies and misuse detections in HPC environment. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Khalid El-Arini, Kevin S. Killourhy Bayesian detection of router configuration anomalies. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router configuration, statistical anomaly detection
19Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci Detecting Traffic Anomalies Using Discrete Wavelet Transform. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Christopher Landauer, Kirstie L. Bellman Detecting Anomalies in Constructed Complex Systems. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19M. Meneganti, F. S. Saviello, Roberto Tagliaferri Fuzzy neural networks for classification and detection of anomalies. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe On the use of sketches and wavelet analysis for network anomaly detection. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF K-L divergence, multi time-scale, PCA, anomaly detection
15Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Sun Leveraging spatio-temporal redundancy for RFID data cleansing. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF uncertainty, data cleaning, probabilistic algorithms, spatio-temporal databases
15Natalie Gruska, Andrzej Wasylkowski, Andreas Zeller Learning from 6, 000 projects: lightweight cross-project anomaly detection. Search on Bibsonomy ISSTA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF language independent parsing, lightweight parsing, mining specifications, formal concept analysis, temporal properties
15Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15HuiKeng Lau, Iain Bate, Jon Timmis An Immuno-engineering Approach for Anomaly Detection in Swarm Robotics. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Immuno-engineering, swarm robotics, foraging
15William Eberle, Lawrence B. Holder Mining for insider threats in business transactions and processes. Search on Bibsonomy CIDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Rania Khalaf, Dieter Roller 0001, Frank Leymann Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Workflow, Transactions, Compensation, WS-BPEL, Error handling
15Yingyi Bu, Lei Chen 0002, Ada Wai-Chee Fu, Dawei Liu Efficient anomaly monitoring over moving object trajectory streams. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF similarity search, outlier detection, temporal data
15Huayang Cao, Miao Wang, Xiaoqiang Wang, Peidong Zhu A Packet-Based Anomaly Detection Model for Inter-domain Routing. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Marcus Chang, Andreas Terzis, Philippe Bonnet Mote-Based Online Anomaly Detection Using Echo State Networks. Search on Bibsonomy DCOSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Real-time, Anomaly detection
15Marat Zhanikeev, Yoshiaki Tanaka Lightweight Traffic Monitoring and Analysis Using Video Compression Techniques. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IP space, anomaly detection, video compression, traffic analysis, traffic monitoring
15Seyyedmohsen Azizi, Mani M. Tousi, Kash Khorasani A distributed and cooperative supervisory estimation of multi-agent systems - Part I: Framework. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Miryung Kim, David Notkin Discovering and representing systematic code changes. Search on Bibsonomy ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Alexander Borisov, George C. Runger, Eugene Tuv Contributor Diagnostics for Anomaly Detection. Search on Bibsonomy ICANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Zhan Wei Lim, Colin Keng-Yan Tan, Winston Khoon Guan Seah, Guan-Hong Tan Detection of Failures in Civil Structures Using Artificial Neural Networks. Search on Bibsonomy ICANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Mitja Lustrek, Bostjan Kaluza, Erik Dovgan, Bogdan Pogorelc, Matjaz Gams Behavior Analysis Based on Coordinates of Body Tags. Search on Bibsonomy AmI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, Activity recognition, gait, fall detection
15Martin Dimitrov, Huiyang Zhou Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging. Search on Bibsonomy ASPLOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF automated debugging, architectural support
15Deyong Hu, Bin Wu 0001, Qi Ye, Bai Wang 0001 Structure Correlation in Mobile Call Networks. Search on Bibsonomy ADMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Clique Size Vector, Visualization, Social Network, Correlation, Anomaly, Structural Property
15Guanhua Yan, Stephan J. Eidenbenz, Bo Sun 0001 Mobi-watchdog: you can steal, but you can't run! Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hhmm, mobility, wireless networks, anomaly detection
15Mark Jäger, Christian Knoll 0001, Fred A. Hamprecht Weakly Supervised Learning of a Classifier for Unusual Event Detection. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Xiaolei Li 0001, Jiawei Han 0001, Sangkyum Kim, Hector Gonzalez Anomaly Detection in Moving Object. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Chinghway Lim, Navjot Singh 0001, Shalini Yajnik A log mining approach to failure analysis of enterprise telephony systems. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Pedro Casas, Lionel Fillatre, Sandrine Vaton, Igor V. Nikiforov Volume Anomaly Detection in Data Networks: An Optimal Detection Algorithm vs. the PCA Approach. Search on Bibsonomy FITraMEn The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network Monitoring and Traffic Analysis, Optimal Volume Anomaly Detection, Network Traffic Modeling
15Jinyu Chen, Ten Long, Kangming Deng The Consistency of Materialized View Maintenance and Drill-Down in a Warehousing Environment. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Jukka Ylitalo, Jan Melén, Patrik Salmela, Henrik Petander An Experimental Evaluation of a HIP Based Network Mobility Scheme. Search on Bibsonomy WWIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newton, Samuel Madden 0001, Hari Balakrishnan The pothole patrol: using a mobile sensor network for road surface monitoring. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF road surface monitoring, mobile sensing
15Iain Bate Utilising Application Flexibility in Energy Aware Computing. Search on Bibsonomy RTCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Christian Callegari, Stefano Giordano, Michele Pagano Application of Wavelet Packet Transform to Network Anomaly Detection. Search on Bibsonomy NEW2AN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Best Basis, Anomaly Detection, IDS, Wavelet Packet
15Hilmi Günes Kayacik, Nur Zincir-Heywood Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Mohammad Alomari, Michael J. Cahill, Alan D. Fekete, Uwe Röhm When serializability comes without cost. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15David Lo 0001 Mining specifications in diversified formats from execution traces. Search on Bibsonomy ICSM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Jinfu Wang 0001, John Bigham Anomaly detection in the case of message oriented middleware. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, message oriented middleware, self-protection
15Pablo García Bringas, Yoseba K. Penya Next-Generation Misuse and Anomaly Prevention System. Search on Bibsonomy ICEIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection
15Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SNMP (Simple Network Management Protocol), MIB-II (Management Information Base), BLGBA (Baseline for Automatic Backbone Management), alarm correlation
15Du-Ming Tsai, Chih-Chia Kuo Defect detection in inhomogeneously textured sputtered surfaces using 3D Fourier image reconstruction. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3D Fourier transforms, Sputtered glass substrates, Inhomogeneous textures, Defect detection, Surface inspection
15Gerhard Münz, Georg Carle Real-time Analysis of Flow Data for Network Attack Detection. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Solmaz Kolahi, Leonid Libkin XML design for relational storage. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF equality-generating dependencies, relational storage, design, information theory, functional dependencies, XML data
15Surekha Mariam Varghese, K. Poulose Jacob Process Profiling Using Frequencies of System Calls. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Leonid Libkin Normalization Theory for XML. Search on Bibsonomy XSym The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Haakon Ringberg, Augustin Soule, Jennifer Rexford, Christophe Diot Sensitivity of PCA for traffic anomaly detection. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF principal component analysis, traffic engineering, network traffic analysis
15Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro NADA - Network Anomaly Detection Algorithm. Search on Bibsonomy DSOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Traffic Anomaly Identification, Anomaly Signature
15Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka Detection and Identification of Neptune Attacks and Flash Crowds. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft Communication-Efficient Tracking of Distributed Cumulative Triggers. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed Triggering, Anomaly Detection, Queueing Theory, Network Monitoring, Data Aggregation
15Virgilijus Sakalauskas, Dalia Kriksciuniene Analysis of the Day-of-the-Week Anomaly for the Case of Emerging Stock Market. Search on Bibsonomy EPIA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF day-of-the-week effect, neural network, statistical analysis, stock market
15Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel Authentication anomaly detection: a case study on a virtual private network. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, data mining, authentication, anomaly detection, virtual private network
15Ziming Zheng, Yawei Li, Zhiling Lan Anomaly localization in large-scale clusters. Search on Bibsonomy CLUSTER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Augustin Soule, Fernando Silveira, Haakon Ringberg, Christophe Diot Challenging the supremacy of traffic matrices in anomaly detection. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF traffic aggregation, anomaly detection
15Janice Warner, Vijayalakshmi Atluri Inter-instance authorization constraints for secure workflow management. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, work flow, authorization constraints
15Marc Ph. Stoecklin Anomaly detection by finding feature distribution outliers. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Krzysztof Juszczyszyn, Grzegorz Kolaczek Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Razvan Racu, Rolf Ernst Scheduling Anomaly Detection and Optimization for Distributed Systems with Preemptive Task-Sets. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Joachim Baumeister, Dietmar Seipel Verification and Refactoring of Ontologies with Rules. Search on Bibsonomy EKAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Shivani Deshpande, Marina Thottan, Tin Kam Ho, Biplab Sikdar 0001 A Statistical Approach to Anomaly Detection in Interdomain Routing. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang Is sampled data sufficient for anomaly detection? Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF portscan, volume anomaly, anomaly detection, sampling
15Jean-Claude Bermond, Michel Cosnard, David Coudert, Stéphane Pérennes Optimal Solution of the Maximum All Request Path Grooming Problem. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ravi Musunuri, Jorge Arturo Cobb An overview of solutions to avoid persistent BGP divergence. Search on Bibsonomy IEEE Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Jimeng Sun 0001, Huiming Qu, Deepayan Chakrabarti, Christos Faloutsos Relevance search and anomaly detection in bipartite graphs. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Alessandra De Paola, S. Fiduccia, Salvatore Gaglio, Luca Gatani, Giuseppe Lo Re, A. Pizzitola, Marco Ortolani, Pietro Storniolo, Alfonso Urso Rule Based Reasoning for Network Management. Search on Bibsonomy CAMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Filippo Ricca, Paolo Tonella Anomaly Detection in Web Applications: A Review of Already Conducted Case Studies. Search on Bibsonomy CSMR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Wenliang Du, Lei Fang, Peng Ning LAD: Localization Anomaly Detection forWireless Sensor Networks. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network security, anomaly detection, filter, configuration, Packet filtering
15Sourabh Ladha, Stephan Baucke, Reiner Ludwig, Paul D. Amer On making SCTP robust to spurious retransmissions. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Bob Mungamuru, Parham Aarabi Enhanced sound localization. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Yuqing Zhang, Xiuying Liu Running-mode analysis of the Security Socket Layer protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Andrzej Jodlowski, Piotr Habela, Jacek Plodzien, Kazimierz Subieta Dynamic Object Roles -- Adjusting the Notion for Flexible Modeling. Search on Bibsonomy IDEAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ehab Al-Shaer Managing firewall and network-edge security policies. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Weichao Wang, Bharat K. Bhargava Visualization of wormholes in sensor networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, visualization, wormhole attacks, multi-dimensional scaling
15Shimon Rura, Barbara Staudt Lerner Flexible Static Semantic Checking Using First-Order Logic. Search on Bibsonomy EWSPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Caleb C. Noble, Diane J. Cook Graph-based anomaly detection. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data mining, anomaly detection, graph regularity
15Dimiter R. Avresky, Natcho H. Natchev Failure Margin and Performance Degradation in "F-Cycle Ring" Networks . Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF failure margin, graceful performance degradation, interconnection networks, partitioning, rings
15Thomas C. Ormerod, Nicola J. Morley, Linden J. Ball, Charles Langley, Clive Spenser Using ethnography to design a mass detection tool (MDT) for the early discovery of insurance fraud. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2003 DBLP  DOI  BibTeX  RDF automated knowledge updating, ethnography, bayesian belief networks, fraud detection, insurance
15Paola Inverardi, Massimo Tivoli Software Architecture for Correct Components Assembly. Search on Bibsonomy SFM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Sultan Valeev, Konstantin Samokhvalov The ARM-Approach Based Local Modelling of the Gravitational Field. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15David Watson 0001, Farnam Jahanian, Craig Labovitz Experiences With Monitoring OSPF on a Regional Service Provider Network. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Kwang-jin Park, Hwang-Bin Ryou Anomaly Detection Scheme Using Data Mining in Mobile Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Li Wei, Weining Qian, Aoying Zhou, Wen Jin, Jeffrey Xu Yu HOT: Hypergraph-Based Outlier Test for Categorical Data. Search on Bibsonomy PAKDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Huseyin Cenk Özmutlu, Natarajan Gautam, Russell R. Barton Zone recovery methodology for probe-subset selection in end-to-end network monitoring. Search on Bibsonomy NOMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov A Formal Analysis of Some Properties of Kerberos 5 Using MSR. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Timothy Griffin, Gordon T. Wilfong On the correctness of IBGP configuration. Search on Bibsonomy SIGCOMM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF BGP congfiguration, internal BGP, BGP, border gateway protocol
15Matthew V. Mahoney 0001, Philip K. Chan Learning nonstationary models of normal network traffic for detecting novel attacks. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15David Ruiz 0001, Rafael Corchuelo, José Antonio Pérez, Miguel Toro An Algorithm for Ensuring Fairness and Liveness in Non-deterministic Systems Based on Multiparty Interactions. Search on Bibsonomy Euro-Par The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Marcelo Arenas, Leonid Libkin A Normal Form for XML Documents. (PDF / PS) Search on Bibsonomy PODS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF XML
15Yan Liu 0003, Tim Menzies, Bojan Cukic Data Sniffing - Monitoring of Machine Learning for Online Adaptive Systems. Search on Bibsonomy ICTAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 3378 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license