Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Christie I. Ezeife, Maxwell Ejelike, Akshai K. Aggarwal |
WIDS: a sensor-based online mining wireless intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: 12th International Database Engineering and Applications Symposium (IDEAS 2008), September 10-12, 2008, Coimbra, Portugal, pp. 255-261, 2008, ACM, 978-1-60558-188-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
CommView for WIFI, hardware sensor, wireless attacks, wireless intrusion detection, clustering |
22 | Manoj K. Agarwal |
Eigen space based method for detecting faulty nodes in large scale enterprise systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 224-231, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Karim Dhambri, Houari A. Sahraoui, Pierre Poulin |
Visual Detection of Design Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 12th European Conference on Software Maintenance and Reengineering, CSMR 2008, April 1-4, 2008, Athens, Greece, pp. 279-283, 2008, IEEE Computer Society, 978-1-4244-2157-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Lorenzo Cavallaro, R. Sekar 0001 |
Anomalous Taint Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 417-418, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Gilles Barthe, Benjamin Grégoire, Colin Riba |
Type-Based Termination with Sized Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: Computer Science Logic, 22nd International Workshop, CSL 2008, 17th Annual Conference of the EACSL, Bertinoro, Italy, September 16-19, 2008. Proceedings, pp. 493-507, 2008, Springer, 978-3-540-87530-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang |
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 2(3), pp. 9, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications |
22 | Latifur Khan, Mamoun Awad, Bhavani Thuraisingham |
A new intrusion detection system using support vector machines and hierarchical clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 16(4), pp. 507-521, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot |
Detectability of Traffic Anomalies in Two Adjacent Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, Proceedings, pp. 22-31, 2007, Springer, 978-3-540-71616-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Syed A. Khayam, Hayder Radha |
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1385-1390, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mohammed Anis Benelbahri, Adel Bouhoula |
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 63-70, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq |
Extended thymus action for reducing false positives in ais based network intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 182, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
artificial immune system, network intrusion detection |
22 | Gang Lu, Junkai Yi, Kevin Lü 0001 |
Statistical and Fuzzy Approach for Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3, pp. 670-674, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Fabrizio Angiulli, Gianluigi Greco, Luigi Palopoli 0001 |
Detecting and Repairing Anomalous Evolutions in Noisy Environments: Logic Programming Formalization and Complexity Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP AI ![In: Artificial Intelligence in Theory and Practice, IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile, pp. 41-50, 2006, Springer, 0-387-34654-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Janice Warner, Vijayalakshmi Atluri |
Inter-instance authorization constraints for secure workflow management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 190-199, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, work flow, authorization constraints |
22 | Qiang Duan, Chenyi Hu, Han-Chieh Wei |
Enhancing network intrusion detection systems with interval methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1444-1448, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
intrusion detection, network control, interval method |
22 | John C. McEachen, John Zachary |
Real-Time Representation of Network Traffic Behavior for Enhanced Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 214-219, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network diagnostics, Intrusion detection, statistical mechanics |
22 | Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka |
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 650-655, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Jian Guan, Daxin Liu 0001, Tong Wang 0005 |
Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part III, pp. 706-714, 2004, Springer, 3-540-22057-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Data Mining, Intrusion Detection, Network Security, Fuzzy Sets |
22 | Sachin P. Joglekar, Stephen R. Tate |
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 81-, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Yi-an Huang, Wenke Lee |
A cooperative intrusion detection system for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003, pp. 135-147, 2003, ACM, 1-58113-783-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur |
Bayesian Event Classification for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 14-23, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Jun Chen, Songting Chen, Elke A. Rundensteiner |
A Transactional Model for Data Warehouse Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2002, 21st International Conference on Conceptual Modeling, Tampere, Finland, October 7-11, 2002, Proceedings, pp. 247-262, 2002, Springer, 3-540-44277-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 274-291, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
22 | Kymie M. C. Tan, John McHugh, Kevin S. Killourhy |
Hiding Intrusions: From the Abnormal to the Normal and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 1-17, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao |
Research on Gravity-Based Anomaly Intrusion Detection Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 350-353, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Xiaorong Cheng, Kun Xie, Dong Wang |
Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 710-713, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | HuiKeng Lau, Iain Bate, Jon Timmis |
An Immuno-engineering Approach for Anomaly Detection in Swarm Robotics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 8th International Conference, ICARIS 2009, York, UK, August 9-12, 2009. Proceedings, pp. 136-150, 2009, Springer, 978-3-642-03245-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Immuno-engineering, swarm robotics, foraging |
21 | Fanping Zeng, Kaitao Yin, Minghui Chen, Xufa Wang |
A New Anomaly Detection Method Based on Rough Set Reduction and HMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 285-289, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam |
On the Inefficient Use of Entropy for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 369-370, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Alexander Borisov, George C. Runger, Eugene Tuv |
Contributor Diagnostics for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part II, pp. 944-953, 2009, Springer, 978-3-642-04276-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Haihua Feng, William Clement Karl, David A. Castañón |
Unified Anomaly Suppression and Boundary Extraction in Laser Radar Range Imagery based on a Joint Curve-Evolution and Expectation-Maximization Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 17(5), pp. 757-766, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Lionel Fillatre, Igor V. Nikiforov, Florent Retraint |
varepsilon -Optimal Non-Bayesian Anomaly Detection for Parametric Tomography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 17(11), pp. 1985-1999, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Shan-Qing Guo, Zhong-Hua Zhao |
An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 283-287, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
density-based clustering algorithm, Intrusion detection, k-means |
21 | Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato |
Efficient Anomaly Detection System for Mobile Handsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 154-160, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Varun Chandola, Varun Mithal, Vipin Kumar 0001 |
Comparative Evaluation of Anomaly Detection Techniques for Sequence Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 743-748, 2008, IEEE Computer Society, 978-0-7695-3502-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Marc Ph. Stoecklin, Jean-Yves Le Boudec, Andreas Kind |
A Two-Layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 9th International Conference, PAM 2008, Cleveland, OH, USA, April 29-30, 2008. Proceedings, pp. 212-221, 2008, Springer, 978-3-540-79231-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Giorgio Davanzo, Eric Medvet, Alberto Bartoli |
A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 711-716, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. |
Dependency graph to improve notifications' semantic on anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 726-729, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Adrian Frei, Marc Rennhard |
Histogram Matrix: Log File Visualization for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 610-617, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Riaz Ahmed Shaikh 0001, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee |
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2038-2043, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Lei Zhang 0048, Patrick Sénac, Emmanuel Lochin, Jérôme Lacan, Michel Diaz |
Cross-layer based erasure code to reduce the 802.11 performance anomaly: when FEC meets ARF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBIWAC ![In: Proceedings of the Sixth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2008, Vancouver, British Columbia, Canada, October 30-31, 2008, pp. 119-124, 2008, ACM, 978-1-60558-055-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
802.11, cross-layer, erasure code |
21 | Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek |
Improving Anomaly Detection Error Rate by Collective Trust Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 398-399, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Zhijun Wang 0001, Hao Che, Jiannong Cao 0001 |
An Integrated Solution for Policy Filtering and Traffic Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 106-120, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniwalla, Jeannette C. M. Janssen |
Link-Based Anomaly Detection in Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 402-405, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ying-Hui Kong, Yun-Jie Lv, Jin-Sha Yuan, Yan-Ming Liu |
A Fast Search Algorithm of Anomaly in Data Streams Based on Shifted Wavelet Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (4) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 4: Embedded Programming / Database Technology / Neural Networks and Applications / Other Applications, December 12-14, 2008, Wuhan, China, pp. 627-630, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Sireesha Krupadanam, Huirong Fu |
Localization Anomaly Detection in Wireless Sensor Networks for Non-flat Terrains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GridNets ![In: Networks for Grid Applications, Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers, pp. 175-186, 2008, Springer, 978-3-642-02079-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LAD, Non-flat Terrain, Wireless Sensor Network, Localization, Attack |
21 | Peng Li 0059, Hyundo Park, Debin Gao, Jianming Fu |
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 392-401, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ting-Wei Hou, Fuh-Gwo Chen |
An anomaly in an interpreter using GCC source-code-level register allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 42(4), pp. 9-13, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GCC source-code-level register allocation, performance, interpreter |
21 | Tsuyoshi Idé, Spiros Papadimitriou, Michail Vlachos |
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), October 28-31, 2007, Omaha, Nebraska, USA, pp. 523-528, 2007, IEEE Computer Society, 0-7695-3018-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | ByungRae Cha, JongGeun Jeong |
Improvement of Anomaly Intrusion Detection Performance by Indirect Relation for FTP Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN ![In: Computational and Ambient Intelligence, 9th International Work-Conference on Artificial Neural Networks, IWANN 2007, San Sebastián, Spain, June 20-22, 2007, Proceedings, pp. 895-902, 2007, Springer, 978-3-540-73006-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Al-Subaie, Mohammad Zulkernine |
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1391-1398, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Haidong Fu, Xiguo Yuan, Kui Zhang, Xiaolong Zhang 0002, Qi Xie |
Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007, December 11-14, 2007, Tsukuba Science City, Japan, pp. 466-472, 2007, IEEE Computer Society, 0-7695-3051-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Like Zhang, Gregory B. White |
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-8, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Luca Tavanti, Rosario Giuseppe Garroppo, Stefano Giordano |
Preventing the performance anomaly of IEEE 802.11 networks with a distributed channel-aware scheduler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-8, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yong Feng 0002, Jiang Zhong, Zhongyang Xiong, Chunxiao Ye, Kaigui Wu |
Network Anomaly Detection Based on DSOM and ACO Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2007, 4th International Symposium on Neural Networks, ISNN 2007, Nanjing, China, June 3-7, 2007, Proceedings, Part II, pp. 947-955, 2007, Springer, 978-3-540-72392-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Patrice Abry, Pierre Borgnat, Guillaume Dewaele |
Invited Talk: Sketch Based Anomaly Detection, Identification and Performance Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 80, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jun Lv, Tong Li 0002, Xing Li |
Research on Network Traffic Anomaly Detection Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 95-100, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Giulia Bruno, Paolo Garza, Elisa Quintarelli, Rosalba Rossato |
Anomaly Detection in XML databases by means of Association Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 387-391, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yue Zhou, Shuicheng Yan, Thomas S. Huang |
Detecting Anomaly in Videos from Trajectory Similarity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1087-1090, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Kyrre M. Begnum, Mark Burgess |
Improving Anomaly Detection Event Analysis Using the EventRank Algorithm. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007, Proceedings, pp. 145-155, 2007, Springer, 978-3-540-72985-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Eric Medvet, Alberto Bartoli |
On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 60-78, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Janies, Chin-Tser Huang |
Fates: A Granular Approach to Real-Time Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 605-610, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yang Li 0002, Binxing Fang |
A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 340-341, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Ihn-Han Bae, Hwa-Ju Lee, Kyung-Sook Lee |
Design and Evaluation of a Dynamic Anomaly Detection Scheme Using the Age of User Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3, pp. 136-140, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Thomas Gamer |
A System for in-Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KiVS ![In: Kommunikation in Verteilten Systemen (KiVS), 15. Fachtagung Kommunikation in Verteilten Systemen, KiVS 2007, Bern, Schweiz, 26. Februar - 2. März 2007, pp. 275-282, 2007, Springer, 978-3-540-69961-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Feng Xue, Weizhong Yan |
Parametric model-based anomaly detection for locomotive subsystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2007, Celebrating 20 years of neural networks, Orlando, Florida, USA, August 12-17, 2007, pp. 3074-3079, 2007, IEEE, 978-1-4244-1379-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
Detection of Silent Worms using Anomaly Connection Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 412-419, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Lingyun Yang, Chuang Liu 0006, Jennifer M. Schopf, Ian T. Foster |
Anomaly detection and diagnosis in grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE Conference on High Performance Networking and Computing, SC 2007, November 10-16, 2007, Reno, Nevada, USA, pp. 33, 2007, ACM Press, 978-1-59593-764-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Thomas Gamer, Michael Scharf, Marcus Schöller |
Collaborative Anomaly-Based Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOS ![In: Self-Organizing Systems, Second International Workshop, IWSOS 2007, The Lake District, UK, September 11-13, 2007, Proceedings, pp. 280-287, 2007, Springer, 978-3-540-74916-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mei-Ling Shyu, Shu-Ching Chen, Kanoksri Sarinnapakorn, LiWu Chang |
Principal Component-based Anomaly Detection Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations and Novel Approaches in Data Mining ![In: Foundations and Novel Approaches in Data Mining, pp. 311-329, 2006, Springer, 978-3-540-28315-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Dino Schweitzer, Leemon C. Baird III |
Discovering an RC4 anomaly through visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 91-94, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, cryptography, algorithm analysis |
21 | Zongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang |
A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 446-453, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kunlun Li, Guifa Teng |
Unsupervised SVM Based on p-kernels for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 59-62, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Al-Subaie, Mohammad Zulkernine |
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 1, pp. 325-332, 2006, IEEE Computer Society, 0-7695-2655-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
A Fuzzy Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 167-168, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry |
A nonself space approach to network anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yi Xie 0002, Shun-Zheng Yu |
A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 811-821, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jianbo Liu, Pu Sun, Dragan Djurdjanovic, Kenneth A. Marko, Jun Ni 0002 |
Growing Structure Multiple Model System Based Anomaly Detection for Crankshaft Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part III, pp. 396-405, 2006, Springer, 3-540-34482-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ke Wang 0009, Janak J. Parekh, Salvatore J. Stolfo |
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 226-248, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hongmei Deng 0001, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee |
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 613-620, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ihn-Han Bae, Hwa-Ju Lee, Kyung-Sook Lee |
Design and Evaluation of a Rough Set-Based Anomaly Detection Scheme Considering Weighted Feature Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I, pp. 483-489, 2006, Springer, 3-540-46535-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ricardo Staciarini Puttini, Maíra Hanashiro, Fábio Miziara, Rafael T. de Sousa Jr., L. Javier García-Villalba, Cláudia Jacy Barenco |
On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings, pp. 182-193, 2006, Springer, 3-540-45174-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Misun Kim, Minsoo Kim 0002, Jae-Hyun Seo |
Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 154-162, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang |
SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 432-439, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Sang-Kyun Noh, Yongmin Kim 0005, DongKook Kim, BongNam Noh |
Network Anomaly Detection Based on Clustering of Sequence Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 349-358, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ki-Sung Yu, Won-Hyuk Lee, Sung-Jin Ahn, Jin-Wook Chung |
Automatic Location Detection System for Anomaly Traffic on Wired/Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 982-988, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada |
ACTM: Anomaly Connection Tree Method to detect Silent Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 901-908, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jimeng Sun 0001, Huiming Qu, Deepayan Chakrabarti, Christos Faloutsos |
Relevance search and anomaly detection in bipartite graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 7(2), pp. 48-55, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Philip K. Chan, Matthew V. Mahoney 0001 |
Modeling Multiple Time Series for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA, pp. 90-97, 2005, IEEE Computer Society, 0-7695-2278-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jimeng Sun 0001, Huiming Qu, Deepayan Chakrabarti, Christos Faloutsos |
Neighborhood Formation and Anomaly Detection in Bipartite Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA, pp. 418-425, 2005, IEEE Computer Society, 0-7695-2278-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Qingbo Yin, Liran Shen, Rubo Zhang, Xueyao Li |
A Novel Anomaly Detection Using Small Training Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2005, 6th International Conference, Brisbane, Australia, July 6-8, 2005, Proceedings, pp. 258-263, 2005, Springer, 3-540-26972-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Suresh Reddy, Sukumar Nandi |
Enhanced Network Traffic Anomaly Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings, pp. 397-403, 2005, Springer, 3-540-30999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | ByungRae Cha, Binod Vaidya, Seung Jo Han |
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 427-433, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Peidong Zhu, Xin Liu, Mingjun Yang, Ming Xu 0002 |
Rule-Based Anomaly Detection of Inter-domain Routing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 6th International Workshop, APPT 2005, Hong Kong, China, October 27-28, 2005, Proceedings, pp. 417-426, 2005, Springer, 3-540-29639-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Fang Liu 0001, Leping Lin |
Unsupervised Anomaly Detection Based on an Evolutionary Artificial Immune Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutionary Computing, EvoWorkshops 2005: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoMUSART, and EvoSTOC, Lausanne, Switzerland, March 30 - April 1, 2005, Proceedings, pp. 166-174, 2005, Springer, 3-540-25396-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zonghua Zhang, Hong Shen 0001 |
Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 989-996, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo |
An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I, pp. 740-748, 2005, Springer, 3-540-25339-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 |
SVision: A Network Host-Centered Anomaly Visualization Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 16-28, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | ByungRae Cha, Kyung-Woo Park, JaeHyun Seo |
Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 254-263, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zhen Liu, Susan M. Bridges |
Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 774-779, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|