The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning. Search on Bibsonomy PAKDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Cheng Zhang, Qinke Peng Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21ByungRae Cha Host Anomaly Detection Performance Analysis Based on System Call of Neuro-Fuzzy Using Soundex Algorithm and N-gram Technique. Search on Bibsonomy Systems Communications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Muhammad Fermi Pasha, Rahmat Budiarto, Mohammad Syukur, Masashi Yamada EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection. Search on Bibsonomy ICMLC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Min Yang 0001, Huanguo Zhang, Jianming Fu, Fei Yan A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Shengfeng Tian, Jian Yu, Chuanhuan Yin Anomaly Detection Using Support Vector Machines. Search on Bibsonomy ISNN (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Bhushan Bauskar, Boleslaw Mikolajczak Modeling inheritance anomaly in concurrent systems using colored Petri nets. Search on Bibsonomy SMC (5) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Xiaoshu Hang, Honghua Dai 0001 Constructing Detectors in Schema Complementary Space for Anomaly Detection. Search on Bibsonomy GECCO (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Haizhi Xu, Wenliang Du, Steve J. Chapin Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Tomoharu Iwata, Kazumi Saito Visualisation of Anomaly Using Mixture Model. Search on Bibsonomy KES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Xiaoshu Hang, Honghua Dai 0001 An Extended Negative Selection Algorithm for Anomaly Detection. Search on Bibsonomy PAKDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Ye Du, Huiqiang Wang, Yonggang Pang HMMs for Anomaly Intrusion Detection. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Douglas Schuler The Seattle Community Network: Anomaly or Replicable Model?. Search on Bibsonomy Digital Cities The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Kwang-jin Park, Hwang-Bin Ryou Anomaly Detection Scheme Using Data Mining in Mobile Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Alfonso Valdes Detecting Novel Scans Through Pattern Anomaly Detection. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Mark Burgess Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems. Search on Bibsonomy DSOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Jun Li, Constantine N. Manikopoulos Investigation of the Performance of GAFT, a Novel Network Anomaly Fault Detection System. Search on Bibsonomy LCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF soft fault detection, statistical processing, neural network classification, Internet, Network management
21Sandeep Kumar, Dharma P. Agrawal A Concurrency Abstraction Model for Avoiding Inheritance Anomaly in Object-Oriented Programs. Search on Bibsonomy Compiler Optimizations for Scalable Parallel Systems Languages The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Joon-Sang Lee, Doo-Hwan Bae, Ikju Han Towards Coping with Role-Binding Anomaly. Search on Bibsonomy Reflection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Jongho Choy, Sung-Bae Cho Anomaly Detection of Computer Usage Using Artificial Intelligence Techniques. Search on Bibsonomy PRICAI Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Eric L. Miller 0001 Statistically based methods for anomaly characterization in images from observations of scattered radiation. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Austin B. Frakt, William Clement Karl, Alan S. Willsky A multiscale hypothesis testing approach to anomaly detection and localization from noisy tomographic data. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Guido Schumacher, Wolfgang Nebel How to Avoid the Inheritance Anomaly in Ada. Search on Bibsonomy Ada-Europe The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Frank Feather, Daniel P. Siewiorek, Roy A. Maxion Fault Detection in an Ethernet Network Using Anomaly Signature Matching. Search on Bibsonomy SIGCOMM The full citation details ... 1993 DBLP  DOI  BibTeX  RDF Ethernet
19Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
19Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan Detecting traffic anomalies using an equilibrium property. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anomaly detection, statistical test
19Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis An integrated approach to detection of fast and slow scanning worms. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model
19Pavel Laskov, Marius Kloft A framework for quantitative security analysis of machine learning. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security
19Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez Design of a Snort-Based Hybrid Intrusion Detection System. Search on Bibsonomy IWANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, Intrusion detection systems, Snort, Network IDS
19Eduard Plett, Sanjoy Das A New Algorithm Based on Negative Selection and Idiotypic Networks for Generating Parsimonious Detector Sets for Industrial Fault Detection Applications. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, Artificial Immune System, real-time applications, industrial applications, negative selection, Biologically Inspired Algorithm
19Chen Zhang, Nianlong Weng, Jianlong Chang, Aoying Zhou Detecting Abnormal Trend Evolution over Multiple Data Streams. Search on Bibsonomy APWeb/WAIM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data Stream Trend Analysis, Anomaly Detection
19Mary McGlohon, Stephen Bay, Markus G. Anderle, David M. Steier, Christos Faloutsos SNARE: a link analytic system for graph labeling and risk detection. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF social networks, anomaly detection, belief propagation
19Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, Jafar M. Al-Kofahi, Tien N. Nguyen Graph-based mining of multiple object usage patterns. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF api usage, groum, object usage, pattern, graph mining, clone, anomaly
19Thomas Gamer, Christoph P. Mayer Large-scale evaluation of distributed attack detection. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed attack detection, large-scale evaluation, anomaly detection, simulation environment, OMNeT++
19Guanhua Yan, Stephan J. Eidenbenz, Bo Sun 0001 Mobi-watchdog: you can steal, but you can't run! Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hhmm, mobility, wireless networks, anomaly detection
19Yacine Bouzida, Christophe Mangin A Framework for Detecting Anomalies in VoIP Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Anomaly detection, SIP, Overlay networks, Voice over IP
19Yoseba K. Penya, Pablo García Bringas Experiences on Designing an Integral Intrusion Detection System. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Mining, Machine Learning, Intrusion Detection, Bayesian Networks, Anomaly Detection, Intrusion Prevention, Misuse Detection
19Kevin S. Killourhy, Roy A. Maxion The Effect of Clock Resolution on Keystroke Dynamics. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Insider-attack detection, Digital biometrics, Anomaly detection, Keystroke dynamics
19Yutaka Hirokawa, Kimihiro Yamamoto, Shigeaki Harada, Ryoichi Kawahara Detection of Leaps/sLumps in Traffic Volume of Internet Backbone. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet backbone, traffic volume, anomaly detection
19Alexander V. Mirgorodskiy, Barton P. Miller Diagnosing Distributed Systems with Self-propelled Instrumentation. Search on Bibsonomy Middleware The full citation details ... 2008 DBLP  DOI  BibTeX  RDF performance analysis, anomaly detection, trace analysis, distributed debugging, dynamic instrumentation
19Kai Shen, Ming Zhong 0006, Sandhya Dwarkadas, Chuanpeng Li, Christopher Stewart, Xiao Zhang Hardware counter driven on-the-fly request signatures. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF operating system adaptation, request classification, server system, anomaly detection, hardware counter
19Eamonn J. Keogh, Stefano Lonardi, Chotirat Ann Ratanamahatana, Li Wei 0001, Sang-Hee Lee, John C. Handley Compression-based data mining of sequential data. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Clustering, Anomaly detection, Kolmogorov complexity, Parameter-free data mining
19Kai Hwang 0001, Min Cai, Ying Chen, Min Qin Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation
19Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo Analysis of Computer Intrusions Using Sequences of Function Calls. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis
19Jeongseok Seo, Sung Deok Cha Masquerade detection based on SVM and sequence-based user commands profile. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF user commands profile, support vector machine (SVM), anomaly detection, masquerade detection
19Shaogang Gong, Caifeng Shan, Tao Xiang 0002 Visual inference of human emotion and behaviour. Search on Bibsonomy ICMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF behaviour profiling, body language recognition, human emotion recognition, intention inference, anomaly detection
19Kaustav Das, Jeff G. Schneider Detecting anomalous records in categorical datasets. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF machine learning, anomaly detection
19Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft Communication-Efficient Tracking of Distributed Cumulative Triggers. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed Triggering, Anomaly Detection, Queueing Theory, Network Monitoring, Data Aggregation
19Yubao Liu, Jiarong Cai, Zhilan Huang, Jingwen Yu, Jian Yin 0001 Fast detection of database system abuse behaviors based on data mining approach. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access profiles, anomaly-based detection model, data system abuse behaviors, maximal access profiles, FP-tree
19Howard S. Burkom, Sean Patrick Murphy Data Classification for Selection of Temporal Alerting Methods for Biosurveillance. Search on Bibsonomy BioSurveillance The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, time series, data classification, biosurveillance
19Songting Chen, Xin Zhang 0002, Elke A. Rundensteiner A Compensation-Based Approach for View Maintenance in Distributed Environments. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF view maintenance anomaly, concurrency control, View maintenance, view synchronization, view adaptation
19P. Ramasubramanian, Arputharaj Kannan A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Search on Bibsonomy Soft Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention
19Haiyu Hou, Gerry V. Dozier An evaluation of negative selection algorithm with constraint-based detectors. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, AIS, negative selection
19Frank S. Rietta Application layer intrusion detection for SQL injection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, database security, SQL injection
19Awais Ahmed Awan, Andrew W. Moore 0002 Synergy: blending heterogeneous measurement elements for effective network monitoring. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed measurement, network traffic monitoring, spatial domain monitoring, anomaly detection
19Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral distance, intrusion detection, anomaly detection, system call
19Ming Li 0002, Shengquan Wang, Wei Zhao 0001 A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF real-time detection, reliable detection, traffic constraint, Anomaly detection
19Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft Toward sophisticated detection with distributed triggers. Search on Bibsonomy MineNet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed triggers, PCA, anomaly detection
19Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal Semi-automated discovery of application session structure. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF application sessions, anomaly detection, traffic analysis
19Kyrre M. Begnum, Mark Burgess Principle Components and Importance Ranking of Distributed Anomalies. Search on Bibsonomy Mach. Learn. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF machine learning, anomaly detection
19Yi Hu, Brajendra Panda Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Malicious transactions, intrusion detection, anomaly detection, data dependency
19Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Search on Bibsonomy Trans. Rough Sets The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse
19Neal Patwari, Alfred O. Hero III, Adam Pacholski Manifold learning visualization of network traffic data. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF internet traffic anomaly detection & forensics, data mining
19Ming Li 0002, Wei Zhao 0001 A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF traffic constraint, static-priority scheduling networks, real-time systems, Anomaly detection, time series, differentiated services
19Stefano Zanero, Sergio M. Savaresi Unsupervised learning techniques for an intrusion detection system. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF principal direction divisive partitioning, quality of clusters, intrusion detection, self-organizing maps, anomaly detection, K-means, unsupervised clustering
19Christos Siaterlis, Basil S. Maglaris Towards multisensor data fusion for DoS detection. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, data fusion, Denial of Service
19Jeffrey B. Colombe, Gregory Stephens Statistical profiling and visualization for detection of malicious insider attacks on computer networks. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF human-computer interaction, information visualization, anomaly detection, cognitive load
19Eamonn J. Keogh, Stefano Lonardi, Chotirat (Ann) Ratanamahatana Towards parameter-free data mining. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF clustering, anomaly detection, parameter-free data mining
19Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai A Probabilistic Method for Detecting Anomalous Program Behavior. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian network, Anomaly detection, System call
19Jihwang Yeo, Moustafa Youssef 0001, Ashok K. Agrawala A framework for wireless LAN monitoring and its applications. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wireless monitoring, security, wireless LAN, traffic characterization, anomaly
19Kwong H. Yung Using Self-Consistent Naive-Bayes to Detect Masquerades. Search on Bibsonomy PAKDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF self-consistent naive-Bayes, intrusion detection, anomaly detection, expectation-maximization algorithm, semisupervised learning, masquerade detection
19Anukool Lakhina, Mark Crovella, Christophe Diot Characterization of network-wide anomalies in traffic flows. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, network traffic analysis
19Yin Zhang 0001, Sumeet Singh, Subhabrata Sen, Nick G. Duffield, Carsten Lund Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data stream computation, hierarchical heavy hitters, change detection, packet classification, network anomaly detection
19Ming Li 0002, Jingao Liu, Dongyang Long Probability Principle of a Reliable Approach to Detect Signs of DDOS Flood Attacks. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Anomaly intrusion detection, DDOS, statistical detection, reliability, probability, intrusion prevention
19Ian F. Akyildiz, Eylem Ekici, Gaofeng Yue A Distributed Multicast Routing Scheme for Multi-Layered Satellite IP Networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion response, cooperative detection, mobile ad-hoc networks, intrusion detection, anomaly detection
19Manikantan Ramadas, Shawn Ostermann, Brett C. Tjaden Detecting Anomalous Network Traffic with Self-organizing Maps. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection, Self-Organizing Maps, Anomaly Detection
19Sung-Bae Cho, Sang-Jun Han Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privilege flow, combining multiple models, hidden Markov model, anomaly detection
19Balachander Krishnamurthy, Subhabrata Sen, Yin Zhang, Yan Chen 0004 Sketch-based change detection: methods, evaluation, and applications. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data stream computation, sketch, forecasting, change detection, time series analysis, network anomaly detection
19David A. Wagner 0001, Paolo Soto Mimicry attacks on host-based intrusion detection systems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detection, host-based intrusion detection, evasion attacks
19Giuseppe Milicia, Vladimiro Sassone Jeeg: a programming language for concurrent objects synchronization. Search on Bibsonomy Java Grande The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Java, temporal logic, inheritance anomaly
19Tieyan Li, Kwok-Yan Lam Detecting anomalous agents in mobile agent system: a preliminary approach. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF agent movement pattern, anomaly detection, mobile agent security
19Chao-Hsin Lin, Tzilla Elrad An Enhanced Reflective Architecture for Adaptation of the Object-Oriented Language/Software. Search on Bibsonomy APSEC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF inheritance exclusion, adaptation, real-time, concurrent, distributed, reflective, inheritance anomaly, open implementation
19Ulrike Lechner Constructs, Concepts and Criteria for Reuse in Concurrent Object-Oriented languages. Search on Bibsonomy FASE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Concurrency, Object orientation, Reuse, Interpretation, Rewriting, ?-calculus, Maude, Inheritance Anomaly
19José E. Gallardo, Francisco Gutiérrez, Blas C. Ruiz Inheritance and Selective Methods Dispatching in Concurrent Haskell. Search on Bibsonomy PLILP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF guarded methods, functional programming, Haskell, inheritance anomaly, Concurrent objects
19Koenraad Audenaert, Luk Levrouw Space efficient data race detection for parallel programs with series-parallel task graphs. Search on Bibsonomy PDP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF space efficient data race detection, series-parallel task graphs, access anomaly, program debugger, on-the-fly methods, pointer variables, series-parallel task graph, spawning types, parallel programming, parallel programs, parallelism, synchronisation, program debugging, shared resource, storage requirements, fork-join
19Guszti Bartfai An Improved Learning Algorithm for the Fuzzy ARTMAP Neural Network. Search on Bibsonomy ANNES The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Match tracking anomaly, Zoo database, Supervised learning, Adaptive Resonance Theory, Fuzzy ARTMAP
19Toshihide Ibaraki, Tiko Kameda, Naoki Katoh Multiversion Cautious Schedulers for Database Concurrency Control. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF read/write steps, multiversion cautious scheduler, incoming sequence, read sets, write sets, MWW, MWRW, multiversion classes, write-write, write-read-write constraints, cancellation anomaly, predeclared steps, read operations, scheduling, concurrency control, database management systems, transactions, transaction processing, polynomial time, logs, rollbacks, reordering, MC, database concurrency control
19Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach
19Liang Huang, Kenny Wong Anomaly Detection by Monitoring Filesystem Activities. Search on Bibsonomy ICPC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Software Diagnosis, Anomaly Detection, Software Monitoring
19Zhiling Lan, Ziming Zheng, Yawei Li Toward Automated Anomaly Identification in Large-Scale Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Anomaly identification, principal component analysis, independent component analysis, outlier detection, large-scale systems
19Maria Riveiro 0001, Göran Falkman Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design. Search on Bibsonomy IV The full citation details ... 2010 DBLP  DOI  BibTeX  RDF maritime domain awareness, visualization, evaluation, anomaly detection, visual analytics
19Shaochun Wu, Tongyu Yuan, Yan Tang, Bofeng Zhang, Daming Wei Geomagnetic Precursor Z Component Diurnal Variation Phase Anomaly Recognition based on the Pattern Distance. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Geomagnetic Precursor, Diurnal Variation, Pattern Distance, Anomaly Recognition
19Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe On the use of sketches and wavelet analysis for network anomaly detection. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF K-L divergence, multi time-scale, PCA, anomaly detection
19Hyeongu Son, Youngseok Lee 0002 Detecting Anomaly Traffic using Flow Data in the real VoIP network. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anomaly flow, SIP, VoIP, IPFIX
19Md. Ahsan Arefin, Klara Nahrstedt, Raoul Rivas, Jiawei Han 0001, Zixia Huang DIAMOND: Correlation-Based Anomaly Monitoring Daemon for DIME. Search on Bibsonomy ISM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Distributed Interactive Multimedia Systems, QoS, Correlations, Anomaly
19Yang Liu 0012, Linfeng Zhang, Yong Guan Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection. Search on Bibsonomy ICDCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Traffic Anomaly, Data Streams, Principle Component Analysis
19Ming-Yang Su, Sheng-Cheng Yeh, Chun-Yuen Lin, Chen-Han Tsai Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online incremental mining, genetic algorithm, anomaly detection, membership functions, Fuzzy association rules
19Yi Xie 0002, Shun-Zheng Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF M-algorithm, hidden semi-Markov model, anomaly detection, DDoS, browsing behaviors
19Christian Callegari, Stefano Giordano, Michele Pagano On the use of co-occurrence matrices for network anomaly detection. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF co-occurrence matrices, anomaly detection
19Mingxi Wu, Xiuyao Song, Chris Jermaine, Sanjay Ranka, John Gums A LRT framework for fast spatial anomaly detection. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LRT spatial anomaly
Displaying result #401 - #500 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license