The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Christie I. Ezeife, Maxwell Ejelike, Akshai K. Aggarwal WIDS: a sensor-based online mining wireless intrusion detection system. Search on Bibsonomy IDEAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CommView for WIFI, hardware sensor, wireless attacks, wireless intrusion detection, clustering
22Manoj K. Agarwal Eigen space based method for detecting faulty nodes in large scale enterprise systems. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Karim Dhambri, Houari A. Sahraoui, Pierre Poulin Visual Detection of Design Anomalies. Search on Bibsonomy CSMR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Lorenzo Cavallaro, R. Sekar 0001 Anomalous Taint Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Gilles Barthe, Benjamin Grégoire, Colin Riba Type-Based Termination with Sized Products. Search on Bibsonomy CSL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptive sub-eigenspace modeling (ASEM), agent-based distributed system, intrusion detection, network security, Agent communications
22Latifur Khan, Mamoun Awad, Bhavani Thuraisingham A new intrusion detection system using support vector machines and hierarchical clustering. Search on Bibsonomy VLDB J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot Detectability of Traffic Anomalies in Two Adjacent Networks. Search on Bibsonomy PAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Syed A. Khayam, Hayder Radha Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mohammed Anis Benelbahri, Adel Bouhoula Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq Extended thymus action for reducing false positives in ais based network intrusion detection systems. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF artificial immune system, network intrusion detection
22Gang Lu, Junkai Yi, Kevin Lü 0001 Statistical and Fuzzy Approach for Database Security. Search on Bibsonomy FSKD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Fabrizio Angiulli, Gianluigi Greco, Luigi Palopoli 0001 Detecting and Repairing Anomalous Evolutions in Noisy Environments: Logic Programming Formalization and Complexity Results. Search on Bibsonomy IFIP AI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Janice Warner, Vijayalakshmi Atluri Inter-instance authorization constraints for secure workflow management. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, work flow, authorization constraints
22Qiang Duan, Chenyi Hu, Han-Chieh Wei Enhancing network intrusion detection systems with interval methods. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, network control, interval method
22John C. McEachen, John Zachary Real-Time Representation of Network Traffic Behavior for Enhanced Security. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network diagnostics, Intrusion detection, statistical mechanics
22Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Jian Guan, Daxin Liu 0001, Tong Wang 0005 Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion Detection, Network Security, Fuzzy Sets
22Sachin P. Joglekar, Stephen R. Tate ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Yi-an Huang, Wenke Lee A cooperative intrusion detection system for ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur Bayesian Event Classification for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Jun Chen, Songting Chen, Elke A. Rundensteiner A Transactional Model for Data Warehouse Maintenance. Search on Bibsonomy ER The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
22Kymie M. C. Tan, John McHugh, Kevin S. Killourhy Hiding Intrusions: From the Abnormal to the Normal and Beyond. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao Research on Gravity-Based Anomaly Intrusion Detection Algorithm. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Xiaorong Cheng, Kun Xie, Dong Wang Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21HuiKeng Lau, Iain Bate, Jon Timmis An Immuno-engineering Approach for Anomaly Detection in Swarm Robotics. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Immuno-engineering, swarm robotics, foraging
21Fanping Zeng, Kaitao Yin, Minghui Chen, Xufa Wang A New Anomaly Detection Method Based on Rough Set Reduction and HMM. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam On the Inefficient Use of Entropy for Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Alexander Borisov, George C. Runger, Eugene Tuv Contributor Diagnostics for Anomaly Detection. Search on Bibsonomy ICANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Haihua Feng, William Clement Karl, David A. Castañón Unified Anomaly Suppression and Boundary Extraction in Laser Radar Range Imagery based on a Joint Curve-Evolution and Expectation-Maximization Algorithm. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Lionel Fillatre, Igor V. Nikiforov, Florent Retraint varepsilon -Optimal Non-Bayesian Anomaly Detection for Parametric Tomography. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Shan-Qing Guo, Zhong-Hua Zhao An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based clustering algorithm, Intrusion detection, k-means
21Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato Efficient Anomaly Detection System for Mobile Handsets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Varun Chandola, Varun Mithal, Vipin Kumar 0001 Comparative Evaluation of Anomaly Detection Techniques for Sequence Data. Search on Bibsonomy ICDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Marc Ph. Stoecklin, Jean-Yves Le Boudec, Andreas Kind A Two-Layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models. Search on Bibsonomy PAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Giorgio Davanzo, Eric Medvet, Alberto Bartoli A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. Dependency graph to improve notifications' semantic on anomaly detection. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Adrian Frei, Marc Rennhard Histogram Matrix: Log File Visualization for Anomaly Detection. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Riaz Ahmed Shaikh 0001, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Lei Zhang 0048, Patrick Sénac, Emmanuel Lochin, Jérôme Lacan, Michel Diaz Cross-layer based erasure code to reduce the 802.11 performance anomaly: when FEC meets ARF. Search on Bibsonomy MOBIWAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 802.11, cross-layer, erasure code
21Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek Improving Anomaly Detection Error Rate by Collective Trust Modeling. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Zhijun Wang 0001, Hao Che, Jiannong Cao 0001 An Integrated Solution for Policy Filtering and Traffic Anomaly Detection. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniwalla, Jeannette C. M. Janssen Link-Based Anomaly Detection in Communication Networks. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Ying-Hui Kong, Yun-Jie Lv, Jin-Sha Yuan, Yan-Ming Liu A Fast Search Algorithm of Anomaly in Data Streams Based on Shifted Wavelet Tree. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Sireesha Krupadanam, Huirong Fu Localization Anomaly Detection in Wireless Sensor Networks for Non-flat Terrains. Search on Bibsonomy GridNets The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LAD, Non-flat Terrain, Wireless Sensor Network, Localization, Attack
21Peng Li 0059, Hyundo Park, Debin Gao, Jianming Fu Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Ting-Wei Hou, Fuh-Gwo Chen An anomaly in an interpreter using GCC source-code-level register allocation. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GCC source-code-level register allocation, performance, interpreter
21Tsuyoshi Idé, Spiros Papadimitriou, Michail Vlachos Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors. Search on Bibsonomy ICDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21ByungRae Cha, JongGeun Jeong Improvement of Anomaly Intrusion Detection Performance by Indirect Relation for FTP Service. Search on Bibsonomy IWANN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Mohammad Al-Subaie, Mohammad Zulkernine The Power of Temporal Pattern Processing in Anomaly Intrusion Detection. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Haidong Fu, Xiguo Yuan, Kui Zhang, Xiaolong Zhang 0002, Qi Xie Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection. Search on Bibsonomy APSCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Like Zhang, Gregory B. White An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Luca Tavanti, Rosario Giuseppe Garroppo, Stefano Giordano Preventing the performance anomaly of IEEE 802.11 networks with a distributed channel-aware scheduler. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Yong Feng 0002, Jiang Zhong, Zhongyang Xiong, Chunxiao Ye, Kaigui Wu Network Anomaly Detection Based on DSOM and ACO Clustering. Search on Bibsonomy ISNN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Patrice Abry, Pierre Borgnat, Guillaume Dewaele Invited Talk: Sketch Based Anomaly Detection, Identification and Performance Evaluation. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jun Lv, Tong Li 0002, Xing Li Research on Network Traffic Anomaly Detection Algorithm. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Giulia Bruno, Paolo Garza, Elisa Quintarelli, Rosalba Rossato Anomaly Detection in XML databases by means of Association Rules. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Yue Zhou, Shuicheng Yan, Thomas S. Huang Detecting Anomaly in Videos from Trajectory Similarity Analysis. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Kyrre M. Begnum, Mark Burgess Improving Anomaly Detection Event Analysis Using the EventRank Algorithm. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Eric Medvet, Alberto Bartoli On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jeff Janies, Chin-Tser Huang Fates: A Granular Approach to Real-Time Anomaly Detection. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Yang Li 0002, Binxing Fang A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Ihn-Han Bae, Hwa-Ju Lee, Kyung-Sook Lee Design and Evaluation of a Dynamic Anomaly Detection Scheme Using the Age of User Profiles. Search on Bibsonomy FSKD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Thomas Gamer A System for in-Network Anomaly Detection. Search on Bibsonomy KiVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Feng Xue, Weizhong Yan Parametric model-based anomaly detection for locomotive subsystems. Search on Bibsonomy IJCNN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada Detection of Silent Worms using Anomaly Connection Tree. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Lingyun Yang, Chuang Liu 0006, Jennifer M. Schopf, Ian T. Foster Anomaly detection and diagnosis in grid environments. Search on Bibsonomy SC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Thomas Gamer, Michael Scharf, Marcus Schöller Collaborative Anomaly-Based Attack Detection. Search on Bibsonomy IWSOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Mei-Ling Shyu, Shu-Ching Chen, Kanoksri Sarinnapakorn, LiWu Chang Principal Component-based Anomaly Detection Scheme. Search on Bibsonomy Foundations and Novel Approaches in Data Mining The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Dino Schweitzer, Leemon C. Baird III Discovering an RC4 anomaly through visualization. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF visualization, cryptography, algorithm analysis
21Zongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Kunlun Li, Guifa Teng Unsupervised SVM Based on p-kernels for Anomaly Detection. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Mohammad Al-Subaie, Mohammad Zulkernine Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. Search on Bibsonomy COMPSAC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Dan Li 0002, Kefei Wang, Jitender S. Deogun A Fuzzy Anomaly Detection System. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry A nonself space approach to network anomaly detection. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Yi Xie 0002, Shun-Zheng Yu A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Jianbo Liu, Pu Sun, Dragan Djurdjanovic, Kenneth A. Marko, Jun Ni 0002 Growing Structure Multiple Model System Based Anomaly Detection for Crankshaft Monitoring. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Ke Wang 0009, Janak J. Parekh, Salvatore J. Stolfo Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Hongmei Deng 0001, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Ihn-Han Bae, Hwa-Ju Lee, Kyung-Sook Lee Design and Evaluation of a Rough Set-Based Anomaly Detection Scheme Considering Weighted Feature Values. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Ricardo Staciarini Puttini, Maíra Hanashiro, Fábio Miziara, Rafael T. de Sousa Jr., L. Javier García-Villalba, Cláudia Jacy Barenco On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Misun Kim, Minsoo Kim 0002, Jae-Hyun Seo Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Sang-Kyun Noh, Yongmin Kim 0005, DongKook Kim, BongNam Noh Network Anomaly Detection Based on Clustering of Sequence Patterns. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Ki-Sung Yu, Won-Hyuk Lee, Sung-Jin Ahn, Jin-Wook Chung Automatic Location Detection System for Anomaly Traffic on Wired/Wireless Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada ACTM: Anomaly Connection Tree Method to detect Silent Worms. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Jimeng Sun 0001, Huiming Qu, Deepayan Chakrabarti, Christos Faloutsos Relevance search and anomaly detection in bipartite graphs. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Philip K. Chan, Matthew V. Mahoney 0001 Modeling Multiple Time Series for Anomaly Detection. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jimeng Sun 0001, Huiming Qu, Deepayan Chakrabarti, Christos Faloutsos Neighborhood Formation and Anomaly Detection in Bipartite Graphs. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Qingbo Yin, Liran Shen, Rubo Zhang, Xueyao Li A Novel Anomaly Detection Using Small Training Sets. Search on Bibsonomy IDEAL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Suresh Reddy, Sukumar Nandi Enhanced Network Traffic Anomaly Detector. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21ByungRae Cha, Binod Vaidya, Seung Jo Han Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Peidong Zhu, Xin Liu, Mingjun Yang, Ming Xu 0002 Rule-Based Anomaly Detection of Inter-domain Routing System. Search on Bibsonomy APPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Fang Liu 0001, Leping Lin Unsupervised Anomaly Detection Based on an Evolutionary Artificial Immune Network. Search on Bibsonomy EvoWorkshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Zonghua Zhang, Hong Shen 0001 Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 SVision: A Network Host-Centered Anomaly Visualization Technique. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21ByungRae Cha, Kyung-Woo Park, JaeHyun Seo Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Zhen Liu, Susan M. Bridges Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license