The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Hongmei Deng 0001, Roger Xu Model Selection for Anomaly Detection in Wireless Ad Hoc Networks. Search on Bibsonomy CIDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Yang Li 0002, Binxing Fang, Li Guo 0001 A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme. Search on Bibsonomy ISNN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Taketoshi Mori, Akinori Fujii, Masamichi Shimosaka, Hiroshi Noguchi, Tomomasa Sato Typical Behavior Patterns Extraction and Anomaly Detection Algorithm Based on Accumulated Home Sensor Data. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29ByungRae Cha, Dongseob Lee Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Like Zhang, Gregory B. White Analysis of Payload Based Application level Network Anomaly Detection. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Mooi Choo Chuah, Fen Fu ECG Anomaly Detection via Time Series Analysis. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Jisheng Wang, David J. Miller 0001, George Kesidis Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Yanfeng Gu, Ye Zhang 0008, Ying Liu Unmixing Component Analysis for Anomaly Detection in Hyperspectral Imagery. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Miao Wang, Cheng Zhang, Jingjing Yu Native API Based Windows Anomaly Intrusion Detection Method Using SVM. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Hao Luo, Binxing Fang, Xiao-chun Yun Anomaly Detection in SMTP Traffic. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Majid Farahmand, Arash Azarfar, A. Jafari, Vahid Zargari A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Xiaolei Li 0001, Jiawei Han 0001, Sangkyum Kim Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Dragos D. Margineantu, Stephen Bay, Philip Chan 0001, Terran Lane Data mining methods for anomaly detection KDD-2005 workshop report. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF detection of anomalies in data, data mining, machine learning, anomalies
29Thomas Stibor, Jonathan Timmis, Claudia Eckert 0001 A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. Search on Bibsonomy ICARIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo, Aloysius K. Mok Real-time task scheduling anomaly: observations and prevention. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF process synchronization, real-time task scheduling
29Hanghang Tong, Chongrong Li, Jingrui He, Jiajian Chen, Quang-Anh Tran, Hai-Xin Duan, Xing Li 0001 Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. Search on Bibsonomy ISNN (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Antti Huima A Note on an Anomaly in Black-Box Testing. Search on Bibsonomy FATES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Kalle Burbeck, Simin Nadjm-Tehrani Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Natalia Stakhanova, Samik Basu 0001, Johnny Wong, Oleg Stakhanov Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Yanxin Wang, Andrew S. Miner, Johnny Wong, Prem Uppuluri Improving Feature Selection in Anomaly Intrusion Detection Using Specifications. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Tsuyoshi Idé, Hisashi Kashima Eigenspace-based anomaly detection in computer systems. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Perron-Frobenius theorem, principal eigenvector, time sequence of graphs, von Mises-Fisher distribution, singular value decomposition
29Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang 0001 Anomaly Detection Using Fast SOFM. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Daniel Massey, Xiaoliang Zhao, Dan Pei, Lan Wang, Lixia Zhang 0001, Randy Bush Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events. Search on Bibsonomy DSOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Mike Fugate, James R. Gattiker Anomaly Detection Enhanced Classification in Computer Intrusion Detection. Search on Bibsonomy SVM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Wenke Lee, Dong Xiang Information-Theoretic Measures for Anomaly Detection. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29José Meseguer 0001 Solving the Inheritance Anomaly in Concurrent Object-Oriented Programming. Search on Bibsonomy ECOOP The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
28Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel Laskov TokDoc: a self-healing web application firewall. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web application, anomaly detection, firewall, intrusion prevention
26Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld Active learning for network intrusion detection. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, intrusion detection, network security, anomaly detection, active learning, support vector data description
26Yin Zhang 0001, Matthew Roughan, Walter Willinger, Lili Qiu Spatio-temporal compressive sensing and internet traffic matrices. Search on Bibsonomy SIGCOMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF prediction, interpolation, anomaly detection, tomography, compressive sensing, traffic matrix
26Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire Impact of IT monoculture on behavioral end host intrusion detection. Search on Bibsonomy WREN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF host intrusion detection, measurement, anomaly detection, user profile, enterprise management
26Tongyuan Wang, Bipin C. Desai Issues in pattern mining and their resolutions. Search on Bibsonomy C3S2E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF probability anomaly, data mining, reliability, sampling, overfitting, frequency distribution
26Xiao Zhi Gao 0001, Seppo J. Ovaska, Xiaolei Wang 0001, Mo-Yuen Chow A neural networks-based negative selection algorithm in fault diagnosis. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Negative selection algorithm, Neural networks, Fault diagnosis, Anomaly detection, Artificial immune systems
26Seong Soo Kim, A. L. Narasimha Reddy Statistical techniques for detecting traffic anomalies through packet header data. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF egress filtering, packet header, real-time network anomaly detection, statistical analysis of network traffic, time series of address correlation, wavelet-based transform, network attack
26Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi The risk-utility tradeoff for IP address truncation. Search on Bibsonomy NDA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, anonymization, anomaly detection
26Sebastian G. Elbaum, Satya Kanduri, Anneliese Amschler Andrews Trace anomalies as precursors of field failures: an empirical study. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deployed software analysis, Empirical study, Anomaly detection, Trace analysis
26Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, Chad R. Frost, Doron Tal, Robert Harris Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle. Search on Bibsonomy Requir. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Contingency requirements, Obstacle analysis, Anomaly handling, Autonomy, Safety-critical software, Requirements evolution
26Eamonn J. Keogh, Jessica Lin 0001, Sang-Hee Lee, Helga Van Herle Finding the most unusual time series subsequence: algorithms and applications. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Time series data mining, Clustering, Anomaly detection
26Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee Understanding Precision in Host Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Program models, Formal analysis
26Julie Greensmith, Uwe Aickelin, Jamie Twycross Articulation and Clarification of the Dendritic Cell Algorithm. Search on Bibsonomy ICARIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, artificial immune systems, dendritic cells
26Jonathon T. Giffin, Somesh Jha, Barton P. Miller Automated Discovery of Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS evaluation, model-based anomaly detection, model checking, attacks
26Dong-Ho Kang, Byoung-Koo Kim, Jintae Oh, Taek Yong Nam, Jong-Soo Jang FPGA Based Intrusion Detection System Against Unknown and Known Attacks. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Protocol Anomaly Detection, Intrusion Detection, Network Security
26Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 A Design and Implementation of Profile Based Web Application Securing Proxy. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web application, Anomaly detection, Proxy, Hacking
26Costantina Caruso, Donato Malerba, Davide Papagni Learning the Daily Model of Network Traffic. Search on Bibsonomy ISMIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF daily model, data mining, machine learning, Anomaly detection, network traffic analysis, symbolic data analysis
26Bruce D. Caulkins, Joohan Lee, Morgan C. Wang A dynamic data mining technique for intrusion detection systems. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF signature detection, data mining, decision tree, anomaly detection, data modeling, intrusion detection system
26Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande, Wenke Lee Anomalous path detection with hardware support. Search on Bibsonomy CASES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomalous path, control flow monitoring, monitoring granularity, anomaly detection, hardware support
26Anukool Lakhina, Mark Crovella, Christophe Diot Diagnosing network-wide traffic anomalies. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, network traffic analysis
26Mark Burgess, Hårek Haugerud, Sigmund Straumsnes, Trond Reitan Measuring system normality. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anomaly detection, statistical mechanics
26Alexandr Seleznyov, Seppo Puuronen HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF HIDSUR, hybrid intrusion detection system, real-time user recognition, computer system protection, anomaly detection, online learning, computer network management, unauthorized access
26Yang Guang, Dongchan Wen, Dingxing Wang A Revised, Inheritance-Supporting Parallel Object Model in PDEFA-I. Search on Bibsonomy TOOLS (36) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Ada95 parallel object-oriented inheritance anomaly concurrent
26Guido Schumacher, Wolfgang Nebel Object-Oriented Modelling of Parallel Hardware Systems. Search on Bibsonomy DATE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Language Issues, VHDL, Inheritance Anomaly
26Ronald Fagin A Normal Form for Relational Databases That Is Based on Domians and Keys. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF DK/NF, domain-key normal form, complexity, relational database, normalization, database design, functional dependency, anomaly, multivalued dependency, join dependency
26Santanu Das, Bryan L. Matthews, Ashok N. Srivastava, Nikunj C. Oza Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF prognostics, prediction, anomaly detection, aeronautics
26Chinmay Rao, Asok Ray, Soumik Sarkar, Murat Yasar Review and comparative evaluation of symbolic dynamic filtering for detection of anomaly patterns. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Neural networks, Anomaly detection, Bayesian filtering, Symbolic dynamics
26Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak Monitoring Smartphones for Anomaly Detection. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF monitoring, anomaly detection, smartphones
26Thomas Stibor Foundations of r-contiguous matching in negative selection for anomaly detection. Search on Bibsonomy Nat. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF k-CNF satisfiability, Anomaly detection, Artificial immune systems, Negative selection
26Edward C. Kaiser, Wu-chang Feng, Travis Schluessler Fides: remote anomaly-based cheat detection using client emulation. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly-based detection, anti-cheating, partial client emulation, remote measurement, online games
26Liang Xi, Fengbin Zhang, Dawei Wang Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution. Search on Bibsonomy AICI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF real-valued self set, anomaly detection, artificial immunity system, Gaussian distribution
26Benjamin T. Fine Unsupervised anomaly detection with minimal sensing. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, anomaly detection, unsupervised learning, minimal spanning tree
26Markus Wälchli, Torsten Braun Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks. Search on Bibsonomy EvoWorkshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sensor networks, pattern recognition, anomaly detection
26Baoliang Xu, Wenjian Luo, Xingxin Pei, Min Zhang 0010, Xufa Wang On average time complexity of evolutionary negative selection algorithms for anomaly detection. Search on Bibsonomy GEC Summit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF drift analysis, evolutionary negative selection algorithm, anomaly detection, artificial immune system, time complexity
26Milosz Marian Hulboj, Ryszard Erazm Jurga CERN Investigation of Network Behaviour and Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, computer networks, network monitoring, packet sampling
26Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF JS-divergence, anomaly detection, SMS, relative entropy
26Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-update, anomaly detection, self-calibrate, sanitization
26Choonho Son, Seok-Hyung Cho, Jae-Hyoung Yoo Volume Traffic Anomaly Detection Using Hierarchical Clustering. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Volume Traffic, Anomaly Detection, Network Management, Hierarchical Clustering
26Wei-Yi Yu, Hahn-Ming Lee An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection system (ADS), Kohonens’ self-organizing maps (SOM), ITI (incremental tree inducer), KDD’99, K-Means clustering
26Gilbert L. Peterson, Brent T. McBride The importance of generalizability for anomaly detection. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Anomaly detection, Convex polytope, Ellipsoid
26Christa Wang, Nabil Belacel VNSOptClust: A Variable Neighborhood Search Based Approach for Unsupervised Anomaly Detection. Search on Bibsonomy MCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Automatic Partitional Clustering, Unsupervised Anomaly Detection, Unsupervised Learning, Variable Neighborhood Search
26Fábio de Lima Bezerra, Jacques Wainer Anomaly detection algorithms in logs of process aware systems. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly detection, information security, process mining
26Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Sahin Albayrak Monitoring smartphones for anomaly detection. Search on Bibsonomy MOBILWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile device, monitoring, anomaly detection, smartphone
26Mehdi Kiani, Andrew J. Clark, George M. Mohay Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly Based Intrusion Detection System, SQL injection
26Nathalie Dagorn WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web application, Anomaly detection, Correlation
26Takeshi Okamoto, Yoshiteru Ishida Dynamic Updating of Profiles for an Immunity-Based Anomaly Detection System. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF immunity-based system, adaptation, intrusion detection, anomaly detection, ROC, receiver operating characteristic
26Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M. Caminhas Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection. Search on Bibsonomy ICARIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Tunable activation threshold hypothesis, T cells, Temporal anomaly detection, Artificial Immune Systems
26Min Gui, Sanjoy Das, Anil Pahwa Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, artificial immune systems, immunocomputing
26Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation
26Ian Morgan, Honghai Liu 0001, George Turnbull, David J. Brown 0002 Time Discretisation Applied to Anomaly Detection in a Marine Engine. Search on Bibsonomy KES (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF discretisation, symbolic aggregate approximation, anomaly detection, Time series
26Huey-Ming Lee, Ching-Hao Mao A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF home network environment, anomaly detection, Adaptive learning
26Ihn-Han Bae A Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Rough Set, Anomaly Detection, User Profile, Age
26Chundong Wang 0002, He-feng Yu, Huai-bin Wang, Kai Liu SOM-Based Anomaly Intrusion Detection System. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly-based intrusion detection, U-matrix, cluster, neural network, SOM
26Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs
26Thomas Gamer, Marcus Schöller, Roland Bless An Extensible and Flexible System for Network Anomaly Detection. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anomaly Detection, DDoS Attacks, Programmable Networks
26Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd An auctioning reputation system based on anomaly. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly detection, auction, reputation system, shilling
26Mei-Ling Shyu, Kanoksri Sarinnapakorn, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang, Thomas Goldring Handling Nominal Features in Anomaly Intrusion Detection Problems. Search on Bibsonomy RIDE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF indicator variables, multiple correspondence analysis, nominal features, principal component classifier, intrusion detection, Anomaly detection
26Jian Zhang 0004, Jennifer Rexford, Joan Feigenbaum Learning-based anomaly detection in BGP updates. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wavelets, anomaly detection, instance-based learning
26Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network security, anomaly detection, filter, configuration, Packet filtering
26Tysen Leckie, Alec Yasinsac Metadata for Anomaly-Based Security Protocol Attack Deduction. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Anomaly detection, user profile, security protocols, behavioral analysis
26Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang 0001 Seurat: A Pointillist Approach to Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Pointillism, File updates, Clustering, Anomaly detection, Correlation
26Bo Sun 0001, Fei Richard Yu, Kui Wu 0001, Victor C. M. Leung Mobility-based anomaly detection in cellular mobile networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data compression, anomaly detection, cellular mobile networks
26Mark Last, Bracha Shapira, Yuval Elovici, Omer Zaafrany, Abraham Kandel Content-Based Methodology for Anomaly Detection on the Web. Search on Bibsonomy AWIC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF information retrieval, user modeling, anomaly detection, web security, activity monitoring, unsupervised clustering
26Michel Mandjes, Iraj Saniee, Alexander L. Stolyar Load chracterization and anomaly detection for voice over IP traffic. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2001 DBLP  DOI  BibTeX  RDF SNMP-based load characterization, VoIP traffic anomaly detection, variance estimation
26Alexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen Learning Temporal Regularities of User Behavior for Anomaly Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF User Recognition, Intrusion Detection, Network Security, Anomaly Detection, User Profiling, Online Learning
23Angelos K. Marnerides, Dimitrios P. Pezaros, David Hutchison 0001 Detection and mitigation of abnormal traffic behaviour in autonomic networked environments. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly classification, anomaly detection, resilience, autonomic networks
23Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan Discriminating and visualizing anomalies using negative selection and self-organizing maps. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly visualization, self-organizing maps, anomaly detection, artificial immune systems, negative selection
22Robert F. Oates, Michael Milford, Gordon F. Wyeth, Graham Kendall, Jonathan M. Garibaldi The implementation of a novel, bio-inspired, robotic security system. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka Testing Detector Parameterization Using Evolutionary Exploit Generation. Search on Bibsonomy EvoWorkshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Jin-Seong Kim, Tae-Jin Lee 0001 Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Mahbod Tavallaee, Wei Lu 0018, Shah Arif Iqbal, Ali A. Ghorbani 0001 A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Wenping Deng, Peidong Zhu, Xicheng Lu ROUSSEAU: A Monitoring System for Inter-domain Routing Security. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Visualization, BGP, Autonomous System, Inter-domain Routing, Security Monitoring
Displaying result #201 - #300 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license