|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Hongmei Deng 0001, Roger Xu |
Model Selection for Anomaly Detection in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDM ![In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, part of the IEEE Symposium Series on Computational Intelligence 2007, Honolulu, Hawaii, USA, 1-5 April 2007, pp. 540-546, 2007, IEEE, 1-4244-0705-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Yang Li 0002, Binxing Fang, Li Guo 0001 |
A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2007, 4th International Symposium on Neural Networks, ISNN 2007, Nanjing, China, June 3-7, 2007, Proceedings, Part I, pp. 1286-1292, 2007, Springer, 978-3-540-72382-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Taketoshi Mori, Akinori Fujii, Masamichi Shimosaka, Hiroshi Noguchi, Tomomasa Sato |
Typical Behavior Patterns Extraction and Anomaly Detection Algorithm Based on Accumulated Home Sensor Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 12-18, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | ByungRae Cha, Dongseob Lee |
Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 141-148, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Like Zhang, Gregory B. White |
Analysis of Payload Based Application level Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 99, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Mooi Choo Chuah, Fen Fu |
ECG Anomaly Detection via Time Series Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28 - September 1, 2007, Proceedings, pp. 123-135, 2007, Springer, 978-3-540-74766-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Jisheng Wang, David J. Miller 0001, George Kesidis |
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(10), pp. 1929-1941, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Yanfeng Gu, Ye Zhang 0008, Ying Liu |
Unmixing Component Analysis for Anomaly Detection in Hyperspectral Imagery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 965-968, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Miao Wang, Cheng Zhang, Jingjing Yu |
Native API Based Windows Anomaly Intrusion Detection Method Using SVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 514-519, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Hao Luo, Binxing Fang, Xiao-chun Yun |
Anomaly Detection in SMTP Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 408-413, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Majid Farahmand, Arash Azarfar, A. Jafari, Vahid Zargari |
A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 53, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Xiaolei Li 0001, Jiawei Han 0001, Sangkyum Kim |
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 166-177, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Dragos D. Margineantu, Stephen Bay, Philip Chan 0001, Terran Lane |
Data mining methods for anomaly detection KDD-2005 workshop report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 7(2), pp. 132-136, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
detection of anomalies in data, data mining, machine learning, anomalies |
29 | Thomas Stibor, Jonathan Timmis, Claudia Eckert 0001 |
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems: 4th International Conference, ICARIS 2005, Banff, Alberta, Canada, August 14-17, 2005, Proceedings, pp. 262-275, 2005, Springer, 3-540-28175-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo, Aloysius K. Mok |
Real-time task scheduling anomaly: observations and prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 897-898, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
process synchronization, real-time task scheduling |
29 | Hanghang Tong, Chongrong Li, Jingrui He, Jiajian Chen, Quang-Anh Tran, Hai-Xin Duan, Xing Li 0001 |
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (3) ![In: Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part III, pp. 476-481, 2005, Springer, 3-540-25914-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Antti Huima |
A Note on an Anomaly in Black-Box Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FATES ![In: Formal Approaches to Software Testing, 5th International Workshop, FATES 2005, Edinburgh, UK, July 11, 2005, Revised Selected Papers, pp. 47-61, 2005, Springer, 3-540-34454-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Kalle Burbeck, Simin Nadjm-Tehrani |
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 195-202, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Natalia Stakhanova, Samik Basu 0001, Johnny Wong, Oleg Stakhanov |
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 203-209, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri |
Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 468, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Tsuyoshi Idé, Hisashi Kashima |
Eigenspace-based anomaly detection in computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 440-449, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Perron-Frobenius theorem, principal eigenvector, time sequence of graphs, von Mises-Fisher distribution, singular value decomposition |
29 | Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang 0001 |
Anomaly Detection Using Fast SOFM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 530-537, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé |
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 428-437, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Daniel Massey, Xiaoliang Zhao, Dan Pei, Lan Wang, Lixia Zhang 0001, Randy Bush |
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Self-Managing Distributed Systems, 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2003, Heidelberg, Germany, October 20-22, 2003, Proceedings, pp. 155-168, 2003, Springer, 3-540-20314-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mike Fugate, James R. Gattiker |
Anomaly Detection Enhanced Classification in Computer Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SVM ![In: Pattern Recognition with Support Vector Machines, First International Workshop, SVM 2002, Niagara Falls, Canada, August 10, 2002, Proceedings, pp. 186-197, 2002, Springer, 3-540-44016-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Wenke Lee, Dong Xiang |
Information-Theoretic Measures for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 130-143, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | José Meseguer 0001 |
Solving the Inheritance Anomaly in Concurrent Object-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'93 - Object-Oriented Programming, 7th European Conference, Kaiserslautern, Germany, July 26-30, 1993, Proceedings, pp. 220-246, 1993, Springer, 3-540-57120-5. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
28 | Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni |
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 452-461, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel Laskov |
TokDoc: a self-healing web application firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1846-1853, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web application, anomaly detection, firewall, intrusion prevention |
26 | Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld |
Active learning for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 47-54, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, network security, anomaly detection, active learning, support vector data description |
26 | Yin Zhang 0001, Matthew Roughan, Walter Willinger, Lili Qiu |
Spatio-temporal compressive sensing and internet traffic matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2009 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Barcelona, Spain, August 16-21, 2009, pp. 267-278, 2009, ACM, 978-1-60558-594-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
prediction, interpolation, anomaly detection, tomography, compressive sensing, traffic matrix |
26 | Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire |
Impact of IT monoculture on behavioral end host intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WREN ![In: Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, WREN 2009, Barcelona, Spain, August 21, 2009, pp. 27-36, 2009, ACM, 978-1-60558-443-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
host intrusion detection, measurement, anomaly detection, user profile, enterprise management |
26 | Tongyuan Wang, Bipin C. Desai |
Issues in pattern mining and their resolutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C3S2E ![In: Canadian Conference on Computer Science & Software Engineering, C3S2E 2009, Montreal, Quebec, Canada, May 19-21, 2009, Proceedings, pp. 17-26, 2009, ACM, 978-1-60558-401-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
probability anomaly, data mining, reliability, sampling, overfitting, frequency distribution |
26 | Xiao Zhi Gao 0001, Seppo J. Ovaska, Xiaolei Wang 0001, Mo-Yuen Chow |
A neural networks-based negative selection algorithm in fault diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 17(1), pp. 91-98, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Negative selection algorithm, Neural networks, Fault diagnosis, Anomaly detection, Artificial immune systems |
26 | Seong Soo Kim, A. L. Narasimha Reddy |
Statistical techniques for detecting traffic anomalies through packet header data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(3), pp. 562-575, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
egress filtering, packet header, real-time network anomaly detection, statistical analysis of network traffic, time series of address correlation, wavelet-based transform, network attack |
26 | Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi |
The risk-utility tradeoff for IP address truncation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 23-30, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, anonymization, anomaly detection |
26 | Sebastian G. Elbaum, Satya Kanduri, Anneliese Amschler Andrews |
Trace anomalies as precursors of field failures: an empirical study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 12(5), pp. 447-469, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deployed software analysis, Empirical study, Anomaly detection, Trace analysis |
26 | Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, Chad R. Frost, Doron Tal, Robert Harris |
Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 12(1), pp. 41-54, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Contingency requirements, Obstacle analysis, Anomaly handling, Autonomy, Safety-critical software, Requirements evolution |
26 | Eamonn J. Keogh, Jessica Lin 0001, Sang-Hee Lee, Helga Van Herle |
Finding the most unusual time series subsequence: algorithms and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 11(1), pp. 1-27, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Time series data mining, Clustering, Anomaly detection |
26 | Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee |
Understanding Precision in Host Based Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 21-41, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anomaly detection, Program models, Formal analysis |
26 | Julie Greensmith, Uwe Aickelin, Jamie Twycross |
Articulation and Clarification of the Dendritic Cell Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006, Proceedings, pp. 404-417, 2006, Springer, 3-540-37749-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, artificial immune systems, dendritic cells |
26 | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
Automated Discovery of Mimicry Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 41-60, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IDS evaluation, model-based anomaly detection, model checking, attacks |
26 | Dong-Ho Kang, Byoung-Koo Kim, Jintae Oh, Taek Yong Nam, Jong-Soo Jang |
FPGA Based Intrusion Detection System Against Unknown and Known Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Guilin, China, August 7-8, 2006, Proceedings, pp. 801-806, 2006, Springer, 3-540-36707-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Protocol Anomaly Detection, Intrusion Detection, Network Security |
26 | Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 |
A Design and Implementation of Profile Based Web Application Securing Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 248-259, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Proxy, Hacking |
26 | Costantina Caruso, Donato Malerba, Davide Papagni |
Learning the Daily Model of Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 15th International Symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings, pp. 131-141, 2005, Springer, 3-540-25878-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
daily model, data mining, machine learning, Anomaly detection, network traffic analysis, symbolic data analysis |
26 | Bruce D. Caulkins, Joohan Lee, Morgan C. Wang |
A dynamic data mining technique for intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 148-153, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system |
26 | Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande, Wenke Lee |
Anomalous path detection with hardware support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2005 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2005, San Francisco, California, USA, September 24-27, 2005, pp. 43-54, 2005, ACM, 1-59593-149-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomalous path, control flow monitoring, monitoring granularity, anomaly detection, hardware support |
26 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Diagnosing network-wide traffic anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 219-230, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, network traffic analysis |
26 | Mark Burgess, Hårek Haugerud, Sigmund Straumsnes, Trond Reitan |
Measuring system normality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 20(2), pp. 125-160, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Anomaly detection, statistical mechanics |
26 | Alexandr Seleznyov, Seppo Puuronen |
HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 41-45, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
HIDSUR, hybrid intrusion detection system, real-time user recognition, computer system protection, anomaly detection, online learning, computer network management, unauthorized access |
26 | Yang Guang, Dongchan Wen, Dingxing Wang |
A Revised, Inheritance-Supporting Parallel Object Model in PDEFA-I. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (36) ![In: TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October - 4 November 2000, pp. 108-113, 2000, IEEE Computer Society, 0-7695-0875-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Ada95 parallel object-oriented inheritance anomaly concurrent |
26 | Guido Schumacher, Wolfgang Nebel |
Object-Oriented Modelling of Parallel Hardware Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 1998 Design, Automation and Test in Europe (DATE '98), February 23-26, 1998, Le Palais des Congrès de Paris, Paris, France, pp. 234-241, 1998, IEEE Computer Society, 0-8186-8359-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Language Issues, VHDL, Inheritance Anomaly |
26 | Ronald Fagin |
A Normal Form for Relational Databases That Is Based on Domians and Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 6(3), pp. 387-415, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
DK/NF, domain-key normal form, complexity, relational database, normalization, database design, functional dependency, anomaly, multivalued dependency, join dependency |
26 | Santanu Das, Bryan L. Matthews, Ashok N. Srivastava, Nikunj C. Oza |
Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 47-56, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
prognostics, prediction, anomaly detection, aeronautics |
26 | Chinmay Rao, Asok Ray, Soumik Sarkar, Murat Yasar |
Review and comparative evaluation of symbolic dynamic filtering for detection of anomaly patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Image Video Process. ![In: Signal Image Video Process. 3(2), pp. 101-114, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Neural networks, Anomaly detection, Bayesian filtering, Symbolic dynamics |
26 | Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak |
Monitoring Smartphones for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 14(1), pp. 92-106, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
monitoring, anomaly detection, smartphones |
26 | Thomas Stibor |
Foundations of r-contiguous matching in negative selection for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Comput. ![In: Nat. Comput. 8(3), pp. 613-641, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
k-CNF satisfiability, Anomaly detection, Artificial immune systems, Negative selection |
26 | Edward C. Kaiser, Wu-chang Feng, Travis Schluessler |
Fides: remote anomaly-based cheat detection using client emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 269-279, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly-based detection, anti-cheating, partial client emulation, remote measurement, online games |
26 | Liang Xi, Fengbin Zhang, Dawei Wang |
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICI ![In: Artificial Intelligence and Computational Intelligence, International Conference, AICI 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 112-120, 2009, Springer, 978-3-642-05252-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
real-valued self set, anomaly detection, artificial immunity system, Gaussian distribution |
26 | Benjamin T. Fine |
Unsupervised anomaly detection with minimal sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, anomaly detection, unsupervised learning, minimal spanning tree |
26 | Markus Wälchli, Torsten Braun |
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings, pp. 81-86, 2009, Springer, 978-3-642-01128-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Sensor networks, pattern recognition, anomaly detection |
26 | Baoliang Xu, Wenjian Luo, Xingxin Pei, Min Zhang 0010, Xufa Wang |
On average time complexity of evolutionary negative selection algorithms for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEC Summit ![In: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC Summit 2009, Shanghai, China, June 12-14, 2009, pp. 631-638, 2009, ACM, 978-1-60558-326-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
drift analysis, evolutionary negative selection algorithm, anomaly detection, artificial immune system, time complexity |
26 | Milosz Marian Hulboj, Ryszard Erazm Jurga |
CERN Investigation of Network Behaviour and Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 353-354, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, computer networks, network monitoring, packet sampling |
26 | Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli |
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 202-223, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
JS-divergence, anomaly detection, SMS, relative entropy |
26 | Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo |
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 41-60, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
self-update, anomaly detection, self-calibrate, sanitization |
26 | Choonho Son, Seok-Hyung Cho, Jae-Hyoung Yoo |
Volume Traffic Anomaly Detection Using Hierarchical Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 291-300, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Volume Traffic, Anomaly Detection, Network Management, Hierarchical Clustering |
26 | Wei-Yi Yu, Hahn-Ming Lee |
An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 155-160, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection system (ADS), Kohonens’ self-organizing maps (SOM), ITI (incremental tree inducer), KDD’99, K-Means clustering |
26 | Gilbert L. Peterson, Brent T. McBride |
The importance of generalizability for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 14(3), pp. 377-392, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Clustering, Anomaly detection, Convex polytope, Ellipsoid |
26 | Christa Wang, Nabil Belacel |
VNSOptClust: A Variable Neighborhood Search Based Approach for Unsupervised Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCO ![In: Modelling, Computation and Optimization in Information Systems and Management Sciences, Second International Conference, MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings, pp. 607-616, 2008, Springer, 978-3-540-87476-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Automatic Partitional Clustering, Unsupervised Anomaly Detection, Unsupervised Learning, Variable Neighborhood Search |
26 | Fábio de Lima Bezerra, Jacques Wainer |
Anomaly detection algorithms in logs of process aware systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 951-952, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anomaly detection, information security, process mining |
26 | Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Sahin Albayrak |
Monitoring smartphones for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILWARE ![In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008, Innsbruck, Austria, February 13 - 15, 2008, pp. 40, 2008, 978-1-59593-984-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile device, monitoring, anomaly detection, smartphone |
26 | Mehdi Kiani, Andrew J. Clark, George M. Mohay |
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 47-55, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anomaly Based Intrusion Detection System, SQL injection |
26 | Nathalie Dagorn |
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 392-393, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Correlation |
26 | Takeshi Okamoto, Yoshiteru Ishida |
Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part III, pp. 456-464, 2008, Springer, 978-3-540-85566-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
immunity-based system, adaptation, intrusion detection, anomaly detection, ROC, receiver operating characteristic |
26 | Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M. Caminhas |
Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 6th International Conference, ICARIS 2007, Santos, Brazil, August 26-29, 2007, Proceedings, pp. 119-130, 2007, Springer, 978-3-540-73921-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Tunable activation threshold hypothesis, T cells, Temporal anomaly detection, Artificial Immune Systems |
26 | Min Gui, Sanjoy Das, Anil Pahwa |
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 261-268, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, artificial immune systems, immunocomputing |
26 | Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna |
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 63-86, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation |
26 | Ian Morgan, Honghai Liu 0001, George Turnbull, David J. Brown 0002 |
Time Discretisation Applied to Anomaly Detection in a Marine Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part I, pp. 405-412, 2007, Springer, 978-3-540-74817-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
discretisation, symbolic aggregate approximation, anomaly detection, Time series |
26 | Huey-Ming Lee, Ching-Hao Mao |
A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 325-332, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
home network environment, anomaly detection, Adaptive learning |
26 | Ihn-Han Bae |
A Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 558-561, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Rough Set, Anomaly Detection, User Profile, Age |
26 | Chundong Wang 0002, He-feng Yu, Huai-bin Wang, Kai Liu |
SOM-Based Anomaly Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 356-366, 2007, Springer, 978-3-540-77091-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly-based intrusion detection, U-matrix, cluster, neural network, SOM |
26 | Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao |
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 105-116, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs |
26 | Thomas Gamer, Marcus Schöller, Roland Bless |
An Extensible and Flexible System for Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autonomic Networking ![In: Autonomic Networking, First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings, pp. 97-108, 2006, Springer, 3-540-45891-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anomaly Detection, DDoS Attacks, Programmable Networks |
26 | Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd |
An auctioning reputation system based on anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 270-279, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomaly detection, auction, reputation system, shilling |
26 | Mei-Ling Shyu, Kanoksri Sarinnapakorn, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang, Thomas Goldring |
Handling Nominal Features in Anomaly Intrusion Detection Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIDE ![In: 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), Stream Data Mining and Applications, 3-7 April 2005, Tokyo, Japan, pp. 55-62, 2005, IEEE Computer Society, 0-7695-2390-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
indicator variables, multiple correspondence analysis, nominal features, principal component classifier, intrusion detection, Anomaly detection |
26 | Jian Zhang 0004, Jennifer Rexford, Joan Feigenbaum |
Learning-based anomaly detection in BGP updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005, pp. 219-220, 2005, ACM, 1-59593-026-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wavelets, anomaly detection, instance-based learning |
26 | Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi |
Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 467-480, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network security, anomaly detection, filter, configuration, Packet filtering |
26 | Tysen Leckie, Alec Yasinsac |
Metadata for Anomaly-Based Security Protocol Attack Deduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 16(9), pp. 1157-1168, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Anomaly detection, user profile, security protocols, behavioral analysis |
26 | Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang 0001 |
Seurat: A Pointillist Approach to Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 238-257, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Pointillism, File updates, Clustering, Anomaly detection, Correlation |
26 | Bo Sun 0001, Fei Richard Yu, Kui Wu 0001, Victor C. M. Leung |
Mobility-based anomaly detection in cellular mobile networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 61-69, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
data compression, anomaly detection, cellular mobile networks |
26 | Mark Last, Bracha Shapira, Yuval Elovici, Omer Zaafrany, Abraham Kandel |
Content-Based Methodology for Anomaly Detection on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWIC ![In: Web Intelligence, First International Atlantic Web Intelligence Conference, AWIC 2003, Madrid, Spain, May 5-6, 2003, Proceedings, pp. 113-123, 2003, Springer, 3-540-40124-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
information retrieval, user modeling, anomaly detection, web security, activity monitoring, unsupervised clustering |
26 | Michel Mandjes, Iraj Saniee, Alexander L. Stolyar |
Load chracterization and anomaly detection for voice over IP traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS/Performance 2001, June 16-20, 2001, Cambridge, MA, USA, pp. 326-327, 2001, ACM, 1-58113-334-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
SNMP-based load characterization, VoIP traffic anomaly detection, variance estimation |
26 | Alexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen |
Learning Temporal Regularities of User Behavior for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings, pp. 143-152, 2001, Springer, 3-540-42103-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
User Recognition, Intrusion Detection, Network Security, Anomaly Detection, User Profiling, Online Learning |
23 | Angelos K. Marnerides, Dimitrios P. Pezaros, David Hutchison 0001 |
Detection and mitigation of abnormal traffic behaviour in autonomic networked environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008, pp. 51, 2008, ACM, 978-1-60558-210-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anomaly classification, anomaly detection, resilience, autonomic networks |
23 | Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan |
Discriminating and visualizing anomalies using negative selection and self-organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Proceedings, Washington DC, USA, June 25-29, 2005, pp. 297-304, 2005, ACM, 1-59593-010-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anomaly visualization, self-organizing maps, anomaly detection, artificial immune systems, negative selection |
22 | Robert F. Oates, Michael Milford, Gordon F. Wyeth, Graham Kendall, Jonathan M. Garibaldi |
The implementation of a novel, bio-inspired, robotic security system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2009 IEEE International Conference on Robotics and Automation, ICRA 2009, Kobe, Japan, May 12-17, 2009, pp. 1875-1880, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Testing Detector Parameterization Using Evolutionary Exploit Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings, pp. 105-110, 2009, Springer, 978-3-642-01128-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Jin-Seong Kim, Tae-Jin Lee 0001 |
Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 335-344, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Mahbod Tavallaee, Wei Lu 0018, Shah Arif Iqbal, Ali A. Ghorbani 0001 |
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 75-81, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Wenping Deng, Peidong Zhu, Xicheng Lu |
ROUSSEAU: A Monitoring System for Inter-domain Routing Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 255-262, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Visualization, BGP, Autonomous System, Inter-domain Routing, Security Monitoring |
Displaying result #201 - #300 of 16067 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|