|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida |
An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 9th Pacific-Asia Conference, PAKDD 2005, Hanoi, Vietnam, May 18-20, 2005, Proceedings, pp. 785-790, 2005, Springer, 3-540-26076-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Cheng Zhang, Qinke Peng |
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 315-321, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | ByungRae Cha |
Host Anomaly Detection Performance Analysis Based on System Call of Neuro-Fuzzy Using Soundex Algorithm and N-gram Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Systems Communications ![In: Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 14-17 August 2005, Montreal, Canada, pp. 116-121, 2005, IEEE Computer Society, 0-7695-2422-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Muhammad Fermi Pasha, Rahmat Budiarto, Mohammad Syukur, Masashi Yamada |
EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: Advances in Machine Learning and Cybernetics, 4th International Conference, ICMLC 2005, Guangzhou, China, August 18-21, 2005, Revised Selected Papers, pp. 662-671, 2005, Springer, 3-540-33584-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Min Yang 0001, Huanguo Zhang, Jianming Fu, Fei Yan |
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 443-450, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Shengfeng Tian, Jian Yu, Chuanhuan Yin |
Anomaly Detection Using Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2004, International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part I, pp. 592-597, 2004, Springer, 3-540-22841-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Bhushan Bauskar, Boleslaw Mikolajczak |
Modeling inheritance anomaly in concurrent systems using colored Petri nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (5) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 4873-4878, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoshu Hang, Honghua Dai 0001 |
Constructing Detectors in Schema Complementary Space for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (1) ![In: Genetic and Evolutionary Computation - GECCO 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part I, pp. 275-286, 2004, Springer, 3-540-22344-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Haizhi Xu, Wenliang Du, Steve J. Chapin |
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 21-38, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Tomoharu Iwata, Kazumi Saito |
Visualisation of Anomaly Using Mixture Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based Intelligent Information and Engineering Systems, 8th International Conference, KES 2004, Wellington, New Zealand, September 20-25, 2004. Proceedings. Part II, pp. 624-631, 2004, Springer, 3-540-23206-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoshu Hang, Honghua Dai 0001 |
An Extended Negative Selection Algorithm for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 8th Pacific-Asia Conference, PAKDD 2004, Sydney, Australia, May 26-28, 2004, Proceedings, pp. 245-254, 2004, Springer, 3-540-22064-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Ye Du, Huiqiang Wang, Yonggang Pang |
HMMs for Anomaly Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 692-697, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Douglas Schuler |
The Seattle Community Network: Anomaly or Replicable Model?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Cities ![In: Digital Cities III, Information Technologies for Social Capital: Cross-cultural Perspectives, Third International Digital Cities Workshop, Amsterdam, The Netherlands, September 18-19, 2003, Revised Selected Papers, pp. 17-42, 2003, Springer, 3-540-25331-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Kwang-jin Park, Hwang-Bin Ryou |
Anomaly Detection Scheme Using Data Mining in Mobile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 21-30, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Alfonso Valdes |
Detecting Novel Scans Through Pattern Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 140-151, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Mark Burgess |
Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Management Technologies for E-Commerce and E-Business Applications, 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002, Montreal, Canada, October 21-23, 2002, Proceedings, pp. 169-180, 2002, Springer, 3-540-00080-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Jun Li, Constantine N. Manikopoulos |
Investigation of the Performance of GAFT, a Novel Network Anomaly Fault Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 6-8 November 2002, Tampa, FL, USA, Proceedings, pp. 249-258, 2002, IEEE Computer Society, 0-7695-1591-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
soft fault detection, statistical processing, neural network classification, Internet, Network management |
21 | Sandeep Kumar, Dharma P. Agrawal |
A Concurrency Abstraction Model for Avoiding Inheritance Anomaly in Object-Oriented Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Compiler Optimizations for Scalable Parallel Systems Languages ![In: Compiler Optimizations for Scalable Parallel Systems Languages, Compilation Techniques, and Run Time Systems, pp. 109-140, 2001, Springer, 3-540-41945-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Joon-Sang Lee, Doo-Hwan Bae, Ikju Han |
Towards Coping with Role-Binding Anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reflection ![In: Metalevel Architectures and Separation of Crosscutting Concerns, Third International Conference, REFLECTION 2001, Kyoto, Japan, September 25-28, 2001, Proceedings, pp. 272-273, 2001, Springer, 3-540-42618-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Jongho Choy, Sung-Bae Cho |
Anomaly Detection of Computer Usage Using Artificial Intelligence Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI Workshops ![In: Advances in Artificial Intelligence. PRICAI 2000 Workshop Reader, Four Workshops held at PRICAI 2000, Melbourne, Australia, August 28 - September 1, 2000, Revised Papers, pp. 31-43, 2000, Springer, 3-540-42597-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Eric L. Miller 0001 |
Statistically based methods for anomaly characterization in images from observations of scattered radiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 8(1), pp. 92-101, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Austin B. Frakt, William Clement Karl, Alan S. Willsky |
A multiscale hypothesis testing approach to anomaly detection and localization from noisy tomographic data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 7(6), pp. 825-837, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Guido Schumacher, Wolfgang Nebel |
How to Avoid the Inheritance Anomaly in Ada. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe '98, 1998 Ada-Europe International Conference on Reliable Software Technologies, Uppsala, Sweden, June 8-12, 1998, Proceedings, pp. 53-64, 1998, Springer, 3-540-64536-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Frank Feather, Daniel P. Siewiorek, Roy A. Maxion |
Fault Detection in an Ethernet Network Using Anomaly Signature Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, Protocols and Applications, San Francisco, CA, USA, September 13-17, 1993, pp. 279-288, 1993, ACM, 0-89791-619-0. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
Ethernet |
19 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 281-290, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
19 | Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan |
Detecting traffic anomalies using an equilibrium property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: SIGMETRICS 2010, Proceedings of the 2010 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, New York, New York, USA, 14-18 June 2010, pp. 377-378, 2010, ACM, 978-1-4503-0038-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly detection, statistical test |
19 | Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis |
An integrated approach to detection of fast and slow scanning worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 80-91, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model |
19 | Pavel Laskov, Marius Kloft |
A framework for quantitative security analysis of machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 1-4, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security |
19 | Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez |
Design of a Snort-Based Hybrid Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (2) ![In: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009 Workshops, Salamanca, Spain, June 10-12, 2009. Proceedings, Part II, pp. 515-522, 2009, Springer, 978-3-642-02480-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Intrusion detection systems, Snort, Network IDS |
19 | Eduard Plett, Sanjoy Das |
A New Algorithm Based on Negative Selection and Idiotypic Networks for Generating Parsimonious Detector Sets for Industrial Fault Detection Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 8th International Conference, ICARIS 2009, York, UK, August 9-12, 2009. Proceedings, pp. 288-300, 2009, Springer, 978-3-642-03245-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Artificial Immune System, real-time applications, industrial applications, negative selection, Biologically Inspired Algorithm |
19 | Chen Zhang, Nianlong Weng, Jianlong Chang, Aoying Zhou |
Detecting Abnormal Trend Evolution over Multiple Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM ![In: Advances in Data and Web Management, Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings, pp. 285-296, 2009, Springer, 978-3-642-00671-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data Stream Trend Analysis, Anomaly Detection |
19 | Mary McGlohon, Stephen Bay, Markus G. Anderle, David M. Steier, Christos Faloutsos |
SNARE: a link analytic system for graph labeling and risk detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1265-1274, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social networks, anomaly detection, belief propagation |
19 | Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, Jafar M. Al-Kofahi, Tien N. Nguyen |
Graph-based mining of multiple object usage patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2009, Amsterdam, The Netherlands, August 24-28, 2009, pp. 383-392, 2009, ACM, 978-1-60558-001-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
api usage, groum, object usage, pattern, graph mining, clone, anomaly |
19 | Thomas Gamer, Christoph P. Mayer |
Large-scale evaluation of distributed attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2009, Rome, Italy, March 2-6, 2009, pp. 68, 2009, ICST/ACM, 978-963-9799-45-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed attack detection, large-scale evaluation, anomaly detection, simulation environment, OMNeT++ |
19 | Guanhua Yan, Stephan J. Eidenbenz, Bo Sun 0001 |
Mobi-watchdog: you can steal, but you can't run! ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 139-150, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hhmm, mobility, wireless networks, anomaly detection |
19 | Yacine Bouzida, Christophe Mangin |
A Framework for Detecting Anomalies in VoIP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 204-211, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Anomaly detection, SIP, Overlay networks, Voice over IP |
19 | Yoseba K. Penya, Pablo García Bringas |
Experiences on Designing an Integral Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 675-679, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data Mining, Machine Learning, Intrusion Detection, Bayesian Networks, Anomaly Detection, Intrusion Prevention, Misuse Detection |
19 | Kevin S. Killourhy, Roy A. Maxion |
The Effect of Clock Resolution on Keystroke Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 331-350, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Insider-attack detection, Digital biometrics, Anomaly detection, Keystroke dynamics |
19 | Yutaka Hirokawa, Kimihiro Yamamoto, Shigeaki Harada, Ryoichi Kawahara |
Detection of Leaps/sLumps in Traffic Volume of Internet Backbone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, October 22-24, 2008. Proceedings, pp. 409-418, 2008, Springer, 978-3-540-88622-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Internet backbone, traffic volume, anomaly detection |
19 | Alexander V. Mirgorodskiy, Barton P. Miller |
Diagnosing Distributed Systems with Self-propelled Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2008, ACM/IFIP/USENIX 9th International Middleware Conference, Leuven, Belgium, December 1-5, 2008, Proceedings, pp. 82-103, 2008, Springer, 978-3-540-89855-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance analysis, anomaly detection, trace analysis, distributed debugging, dynamic instrumentation |
19 | Kai Shen, Ming Zhong 0006, Sandhya Dwarkadas, Chuanpeng Li, Christopher Stewart, Xiao Zhang |
Hardware counter driven on-the-fly request signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008, Seattle, WA, USA, March 1-5, 2008, pp. 189-200, 2008, ACM, 978-1-59593-958-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
operating system adaptation, request classification, server system, anomaly detection, hardware counter |
19 | Eamonn J. Keogh, Stefano Lonardi, Chotirat Ann Ratanamahatana, Li Wei 0001, Sang-Hee Lee, John C. Handley |
Compression-based data mining of sequential data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 14(1), pp. 99-129, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Clustering, Anomaly detection, Kolmogorov complexity, Parameter-free data mining |
19 | Kai Hwang 0001, Min Cai, Ying Chen, Min Qin |
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(1), pp. 41-55, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SNORT and Bro systems, Internet episodes, traffic data mining, Network security, anomaly detection, intrusion detection systems, false alarms, signature generation |
19 | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo |
Analysis of Computer Intrusions Using Sequences of Function Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(2), pp. 137-150, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis |
19 | Jeongseok Seo, Sung Deok Cha |
Masquerade detection based on SVM and sequence-based user commands profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 398-400, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
user commands profile, support vector machine (SVM), anomaly detection, masquerade detection |
19 | Shaogang Gong, Caifeng Shan, Tao Xiang 0002 |
Visual inference of human emotion and behaviour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: Proceedings of the 9th International Conference on Multimodal Interfaces, ICMI 2007, Nagoya, Aichi, Japan, November 12-15, 2007, pp. 22-29, 2007, ACM, 978-1-59593-817-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
behaviour profiling, body language recognition, human emotion recognition, intention inference, anomaly detection |
19 | Kaustav Das, Jeff G. Schneider |
Detecting anomalous records in categorical datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 220-229, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
19 | Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft |
Communication-Efficient Tracking of Distributed Cumulative Triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007, Toronto, Ontario, Canada, pp. 54, 2007, IEEE Computer Society, 0-7695-2837-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed Triggering, Anomaly Detection, Queueing Theory, Network Monitoring, Data Aggregation |
19 | Yubao Liu, Jiarong Cai, Zhilan Huang, Jingwen Yu, Jian Yin 0001 |
Fast detection of database system abuse behaviors based on data mining approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 37, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access profiles, anomaly-based detection model, data system abuse behaviors, maximal access profiles, FP-tree |
19 | Howard S. Burkom, Sean Patrick Murphy |
Data Classification for Selection of Temporal Alerting Methods for Biosurveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioSurveillance ![In: Intelligence and Security Informatics: Biosurveillance, Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007, Proceedings., pp. 59-70, 2007, Springer, 978-3-540-72607-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, time series, data classification, biosurveillance |
19 | Songting Chen, Xin Zhang 0002, Elke A. Rundensteiner |
A Compensation-Based Approach for View Maintenance in Distributed Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(8), pp. 1068-1081, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
view maintenance anomaly, concurrency control, View maintenance, view synchronization, view adaptation |
19 | P. Ramasubramanian, Arputharaj Kannan |
A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 10(8), pp. 699-714, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention |
19 | Haiyu Hou, Gerry V. Dozier |
An evaluation of negative selection algorithm with constraint-based detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006, pp. 134-139, 2006, ACM, 1-59593-315-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, AIS, negative selection |
19 | Frank S. Rietta |
Application layer intrusion detection for SQL injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006, pp. 531-536, 2006, ACM, 1-59593-315-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, database security, SQL injection |
19 | Awais Ahmed Awan, Andrew W. Moore 0002 |
Synergy: blending heterogeneous measurement elements for effective network monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006, pp. 41, 2006, ACM, 1-59593-456-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed measurement, network traffic monitoring, spatial domain monitoring, anomaly detection |
19 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Behavioral Distance Measurement Using Hidden Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 19-40, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
behavioral distance, intrusion detection, anomaly detection, system call |
19 | Ming Li 0002, Shengquan Wang, Wei Zhao 0001 |
A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 541-550, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
real-time detection, reliable detection, traffic constraint, Anomaly detection |
19 | Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft |
Toward sophisticated detection with distributed triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, MineNet 2006, Pisa, Italy, September 15, 2006, pp. 311-316, 2006, ACM, 1-59593-569-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed triggers, PCA, anomaly detection |
19 | Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Can Emre Koksal |
Semi-automated discovery of application session structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 119-132, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
application sessions, anomaly detection, traffic analysis |
19 | Kyrre M. Begnum, Mark Burgess |
Principle Components and Importance Ranking of Distributed Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. ![In: Mach. Learn. 58(2-3), pp. 217-230, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
19 | Yi Hu, Brajendra Panda |
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 13(3), pp. 269-291, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Malicious transactions, intrusion detection, anomaly detection, data dependency |
19 | Sanjay Rawat 0001, Ved Prakash Gulati, Arun K. Pujari |
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Rough Sets ![In: Transactions on Rough Sets IV, pp. 144-161, 2005, Springer, 3-540-29830-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection, Rough Set, Decision Table, Anomaly, Misuse |
19 | Neal Patwari, Alfred O. Hero III, Adam Pacholski |
Manifold learning visualization of network traffic data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005, pp. 191-196, 2005, ACM, 1-59593-026-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet traffic anomaly detection & forensics, data mining |
19 | Ming Li 0002, Wei Zhao 0001 |
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 267-272, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
traffic constraint, static-priority scheduling networks, real-time systems, Anomaly detection, time series, differentiated services |
19 | Stefano Zanero, Sergio M. Savaresi |
Unsupervised learning techniques for an intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 412-419, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
principal direction divisive partitioning, quality of clusters, intrusion detection, self-organizing maps, anomaly detection, K-means, unsupervised clustering |
19 | Christos Siaterlis, Basil S. Maglaris |
Towards multisensor data fusion for DoS detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 439-446, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data fusion, Denial of Service |
19 | Jeffrey B. Colombe, Gregory Stephens |
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 138-142, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, information visualization, anomaly detection, cognitive load |
19 | Eamonn J. Keogh, Stefano Lonardi, Chotirat (Ann) Ratanamahatana |
Towards parameter-free data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 206-215, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
clustering, anomaly detection, parameter-free data mining |
19 | Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai |
A Probabilistic Method for Detecting Anomalous Program Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 87-98, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian network, Anomaly detection, System call |
19 | Jihwang Yeo, Moustafa Youssef 0001, Ashok K. Agrawala |
A framework for wireless LAN monitoring and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 70-79, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
wireless monitoring, security, wireless LAN, traffic characterization, anomaly |
19 | Kwong H. Yung |
Using Self-Consistent Naive-Bayes to Detect Masquerades. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 8th Pacific-Asia Conference, PAKDD 2004, Sydney, Australia, May 26-28, 2004, Proceedings, pp. 329-340, 2004, Springer, 3-540-22064-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
self-consistent naive-Bayes, intrusion detection, anomaly detection, expectation-maximization algorithm, semisupervised learning, masquerade detection |
19 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Characterization of network-wide anomalies in traffic flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 201-206, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, network traffic analysis |
19 | Yin Zhang 0001, Sumeet Singh, Subhabrata Sen, Nick G. Duffield, Carsten Lund |
Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 101-114, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
data stream computation, hierarchical heavy hitters, change detection, packet classification, network anomaly detection |
19 | Ming Li 0002, Jingao Liu, Dongyang Long |
Probability Principle of a Reliable Approach to Detect Signs of DDOS Flood Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 596-599, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Anomaly intrusion detection, DDOS, statistical detection, reliability, probability, intrusion prevention |
19 | Ian F. Akyildiz, Eylem Ekici, Gaofeng Yue |
A Distributed Multicast Routing Scheme for Multi-Layered Satellite IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 9(5), pp. 535-544, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intrusion response, cooperative detection, mobile ad-hoc networks, intrusion detection, anomaly detection |
19 | Manikantan Ramadas, Shawn Ostermann, Brett C. Tjaden |
Detecting Anomalous Network Traffic with Self-organizing Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 36-54, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Self-Organizing Maps, Anomaly Detection |
19 | Sung-Bae Cho, Sang-Jun Han |
Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 207-219, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privilege flow, combining multiple models, hidden Markov model, anomaly detection |
19 | Balachander Krishnamurthy, Subhabrata Sen, Yin Zhang, Yan Chen 0004 |
Sketch-based change detection: methods, evaluation, and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, IMC 2003, Miami Beach, FL, USA, October 27-29, 2003, pp. 234-247, 2003, ACM, 1-58113-773-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
data stream computation, sketch, forecasting, change detection, time series analysis, network anomaly detection |
19 | David A. Wagner 0001, Paolo Soto |
Mimicry attacks on host-based intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 255-264, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anomaly detection, host-based intrusion detection, evasion attacks |
19 | Giuseppe Milicia, Vladimiro Sassone |
Jeeg: a programming language for concurrent objects synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Java Grande ![In: Proceedings of the 2002 Joint ACM-ISCOPE Conference on Java Grande 2002, Seattle, Washington, USA, November 3-5, 2002, pp. 212-221, 2002, ACM, 1-58113-599-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Java, temporal logic, inheritance anomaly |
19 | Tieyan Li, Kwok-Yan Lam |
Detecting anomalous agents in mobile agent system: a preliminary approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 655-656, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
agent movement pattern, anomaly detection, mobile agent security |
19 | Chao-Hsin Lin, Tzilla Elrad |
An Enhanced Reflective Architecture for Adaptation of the Object-Oriented Language/Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 5th Asia-Pacific Software Engineering Conference (APSEC '98), 2-4 December 1998, Taipei, Taiwan, ROC, pp. 20-27, 1998, IEEE Computer Society, 0-8186-9183-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
inheritance exclusion, adaptation, real-time, concurrent, distributed, reflective, inheritance anomaly, open implementation |
19 | Ulrike Lechner |
Constructs, Concepts and Criteria for Reuse in Concurrent Object-Oriented languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 1st Internationsl Conference, FASE'98, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings, pp. 171-187, 1998, Springer, 3-540-64303-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Concurrency, Object orientation, Reuse, Interpretation, Rewriting, ?-calculus, Maude, Inheritance Anomaly |
19 | José E. Gallardo, Francisco Gutiérrez, Blas C. Ruiz |
Inheritance and Selective Methods Dispatching in Concurrent Haskell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLILP ![In: Programming Languages: Implementations, Logics, and Programs, 9th International Symposium, PLILP'97, Including a Special Trach on Declarative Programming Languages in Education, Southampton, UK, September 3-5, 1997, Proceedings, pp. 33-46, 1997, Springer, 3-540-63398-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
guarded methods, functional programming, Haskell, inheritance anomaly, Concurrent objects |
19 | Koenraad Audenaert, Luk Levrouw |
Space efficient data race detection for parallel programs with series-parallel task graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 3rd Euromicro Workshop on Parallel and Distributed Processing (PDP '95), January 25-27, 1995, San Remo, Italy, pp. 508-515, 1995, IEEE Computer Society, 0-8186-7031-2. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
space efficient data race detection, series-parallel task graphs, access anomaly, program debugger, on-the-fly methods, pointer variables, series-parallel task graph, spawning types, parallel programming, parallel programs, parallelism, synchronisation, program debugging, shared resource, storage requirements, fork-join |
19 | Guszti Bartfai |
An Improved Learning Algorithm for the Fuzzy ARTMAP Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANNES ![In: 2nd New Zealand Two-Stream International Conference on Artificial Neural Networks and Expert Systems (ANNES '95), November 20-23, 1995, Dunedin, New Zealand, pp. 34-37, 1995, IEEE Computer Society, 0-8186-7174-2. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Match tracking anomaly, Zoo database, Supervised learning, Adaptive Resonance Theory, Fuzzy ARTMAP |
19 | Toshihide Ibaraki, Tiko Kameda, Naoki Katoh |
Multiversion Cautious Schedulers for Database Concurrency Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(3), pp. 302-315, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
read/write steps, multiversion cautious scheduler, incoming sequence, read sets, write sets, MWW, MWRW, multiversion classes, write-write, write-read-write constraints, cancellation anomaly, predeclared steps, read operations, scheduling, concurrency control, database management systems, transactions, transaction processing, polynomial time, logs, rollbacks, reordering, MC, database concurrency control |
19 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 221-228, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
19 | Liang Huang, Kenny Wong |
Anomaly Detection by Monitoring Filesystem Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPC ![In: The 19th IEEE International Conference on Program Comprehension, ICPC 2011, Kingston, ON, Canada, June 22-24, 2011, pp. 221-222, 2011, IEEE Computer Society, 978-1-61284-308-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Software Diagnosis, Anomaly Detection, Software Monitoring |
19 | Zhiling Lan, Ziming Zheng, Yawei Li |
Toward Automated Anomaly Identification in Large-Scale Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 21(2), pp. 174-187, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Anomaly identification, principal component analysis, independent component analysis, outlier detection, large-scale systems |
19 | Maria Riveiro 0001, Göran Falkman |
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 14th International Conference on Information Visualisation, IV 2010, 26-29 July 2010, London, UK, pp. 170-178, 2010, IEEE Computer Society, 978-0-7695-4165-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
maritime domain awareness, visualization, evaluation, anomaly detection, visual analytics |
19 | Shaochun Wu, Tongyu Yuan, Yan Tang, Bofeng Zhang, Daming Wei |
Geomagnetic Precursor Z Component Diurnal Variation Phase Anomaly Recognition based on the Pattern Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1229-1234, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Geomagnetic Precursor, Diurnal Variation, Pattern Distance, Anomaly Recognition |
19 | Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe |
On the use of sketches and wavelet analysis for network anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 331-335, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
K-L divergence, multi time-scale, PCA, anomaly detection |
19 | Hyeongu Son, Youngseok Lee 0002 |
Detecting Anomaly Traffic using Flow Data in the real VoIP network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 253-256, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly flow, SIP, VoIP, IPFIX |
19 | Md. Ahsan Arefin, Klara Nahrstedt, Raoul Rivas, Jiawei Han 0001, Zixia Huang |
DIAMOND: Correlation-Based Anomaly Monitoring Daemon for DIME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: 12th IEEE International Symposium on Multimedia, ISM 2010, Taichung, Taiwan, December 13-15, 2010, pp. 137-144, 2010, IEEE Computer Society, 978-1-4244-8672-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Distributed Interactive Multimedia Systems, QoS, Correlations, Anomaly |
19 | Yang Liu 0012, Linfeng Zhang, Yong Guan |
Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010, pp. 807-816, 2010, IEEE Computer Society, 978-0-7695-4059-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Traffic Anomaly, Data Streams, Principle Component Analysis |
19 | Ming-Yang Su, Sheng-Cheng Yeh, Chun-Yuen Lin, Chen-Han Tsai |
Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010, pp. 582-587, 2010, IEEE Computer Society, 978-1-4244-8095-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
online incremental mining, genetic algorithm, anomaly detection, membership functions, Fuzzy association rules |
19 | Yi Xie 0002, Shun-Zheng Yu |
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 54-65, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
M-algorithm, hidden semi-Markov model, anomaly detection, DDoS, browsing behaviors |
19 | Christian Callegari, Stefano Giordano, Michele Pagano |
On the use of co-occurrence matrices for network anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 96-100, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
co-occurrence matrices, anomaly detection |
19 | Mingxi Wu, Xiuyao Song, Chris Jermaine, Sanjay Ranka, John Gums |
A LRT framework for fast spatial anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 887-896, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
LRT spatial anomaly |
Displaying result #401 - #500 of 16067 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|