The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Symeon Papavassiliou, Mike Pace, Anthony G. Zawadzki Proactive maintenance tools for transaction oriented wide area networks. Search on Bibsonomy NOMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Christoph C. Michael, Anup K. Ghosh Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, machine learning, finite automata, feature detection
14Faron Moller, Chris M. N. Tofts Relating Processes With Respect to Speed. Search on Bibsonomy CONCUR The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
14Edith Schonberg On-the-fly detection of access anomalies (with retrospective) Search on Bibsonomy Best of PLDI The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
14Edith Schonberg On-The-Fly Detection of Access Anomalies. Search on Bibsonomy PLDI The full citation details ... 1989 DBLP  DOI  BibTeX  RDF Ada
14Catriel Beeri, Michael Kifer Elimination of intersection anomalies from database schemes. Search on Bibsonomy J. ACM The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
14Catriel Beeri, Michael Kifer Elimination of Intersection Anomalies from Database Schemes. Search on Bibsonomy PODS The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
14Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 Key escrow schemes with sliding window for privacy-aware anomaly detection system. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Shamir's scheme, privacy, sliding window, key revocation
14Satnam Singh, Haiying Tu, William Donat, Krishna R. Pattipati, Peter Willett 0001 Anomaly Detection via Feature-Aided Tracking and Hidden Markov Models. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Maria Riveiro 0001, Göran Falkman Interactive Visualization of Normal Behavioral Models and Expert Rules for Maritime Anomaly Detection. Search on Bibsonomy CGIV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Olivier Sarrouy, Eric Totel, Bernard Jouga Application Data Consistency Checking for Anomaly Based Intrusion Detection. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Yingyi Bu, Lei Chen 0002, Ada Wai-Chee Fu, Dawei Liu Efficient anomaly monitoring over moving object trajectory streams. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF similarity search, outlier detection, temporal data
14Huayang Cao, Miao Wang, Xiaoqiang Wang, Peidong Zhu A Packet-Based Anomaly Detection Model for Inter-domain Routing. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Claudio Mazzariello, Carlo Sansone Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. Search on Bibsonomy ICIAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Antonia Azzini, Matteo De Felice, Sandro Meloni, Andrea Tettamanzi Soft Computing Techniques for Internet Backbone Traffic Anomaly Detection. Search on Bibsonomy EvoWorkshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Honglei Gao, Guolong Chen, Wenzhong Guo A GEP-Based Anomaly Detection Scheme in Wireless Sensor Networks. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Martin Dimitrov, Huiyang Zhou Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging. Search on Bibsonomy ASPLOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF automated debugging, architectural support
14Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial learning, principal components analysis, robust statistics, network traffic analysis
14Lloyd L. Philipson The "Bayesian Anomaly" and Its Practical Mitigation. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mahmoud Jazzar, Aman Jantan An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF False alerts, Security, Intrusion detection, Fuzzy cognitive maps
14Xiaolei Li 0001, Jiawei Han 0001, Sangkyum Kim, Hector Gonzalez Anomaly Detection in Moving Object. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Alexis Huck, Mireille Guillaume A CFAR algorithm for anomaly detection and discrimination in hyperspectral images. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Thomas Gamer, Christoph P. Mayer, Martina Zitterbart Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Carlo Bellettini, Julian L. Rrushi A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jeff Craighead, Rodrigo Gutierrez, Jennifer L. Burke, Robin R. Murphy Validating the Search and Rescue Game Environment as a robot simulator by performing a simulated anomaly detection task. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Florent Chatelain, Pierre Borgnat, Jean-Yves Tourneret, Patrice Abry Parameter estimation for sums of correlated gamma random variables. Application to anomaly detection in internet traffic. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Anna Sperotto, Ramin Sadre, Aiko Pras Anomaly Characterization in Flow-Based Traffic Time Series. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Peter Romirer-Maierhofer, Fabio Ricciato Towards Anomaly Detection in One-Way Delay Measurements for 3G Mobile Networks: A Preliminary Study. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar Evading Anomaly Detection through Variance Injection Attacks on PCA. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Rafal Pokrywka Reducing False Alarm Rate in Anomaly Detection with Layered Filtering. Search on Bibsonomy ICCS (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Fei Ren, Liang Hu 0001, Hao Liang 0001, Xiaobo Liu, Weiwu Ren Using Density-Based Incremental Clustering for Anomaly Detection. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14MeiLing Cai A Novel Immunity-Based Model for Anomaly Detection. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ruhui Ma, Yuan Liu, Xing Lin, Zhang Wang Network Anomaly Detection Using RBF Neural Network with Hybrid QPSO. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis Casting out Demons: Sanitizing Training Data for Anomaly Sensors. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001 Automated network feature weighting-based anomaly detection. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Kuo-Chen Lee, Jason Chang, Ming-Syan Chen PAID: Packet Analysis for Anomaly Intrusion Detection. Search on Bibsonomy PAKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Mining, Machine Learning, Intrusion Detection, Network Security
14Roya Ensafi, Soheila Dehghanzadeh, Mohammad R. Akbarzadeh-Totonchi Optimizing Fuzzy K-means for network anomaly detection using PSO. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mehmet Celenk, Thomas Conley, John Willis, James Graham Anomaly detection and visualization using Fisher Discriminant clustering of network entropy. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Sasa Mrdovic, Branislava Perunicic NIDS based on payload word frequencies and anomaly of transitions. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Pascal Schöttle, Thomas Dreibholz, Erwin P. Rathgeb On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Yan Yu, Shanqing Guo, Shaohua Lan, Tao Ban Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning. Search on Bibsonomy ICONIP (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr. Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SNMP (Simple Network Management Protocol), MIB-II (Management Information Base), BLGBA (Baseline for Automatic Backbone Management), alarm correlation
14Stewart Massie, Nirmalie Wiratunga, Susan Craw, Alessandro Donati, Emmanuel Vicari From Anomaly Reports to Cases. Search on Bibsonomy ICCBR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Veselina G. Jecheva, Evgeniya P. Nikolova Decoding efficiency of the MAP and the max-log MAP algorithm as a strategy in anomaly-based intrusion detection systems. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF max log MAP algorithm, maximum a posteriori (MAP) algorithm, maximum likelihood (ML) criterion, hidden Markov models (HMM), intrusion detection, gradient method
14Marco Mamei, Radhika Nagpal Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Sung-Min Jang, Yoo-Hun Won Web Anomaly Detection System for Mobile Web Client. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jun Luo, Li Ding 0003, Zhisong Pan, Guiqiang Ni, Guyu Hu Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Byoung Uk Kim, Salim Hariri Anomaly-based Fault Detection System in Distributed System. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Alexis Huck, Mireille Guillaume Independent Component Analysis-Based Estimation of Anomaly Abundances in Hyperspectral Images. Search on Bibsonomy ACIVS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Daxin Tian, Yanheng Liu, Bin Li A Distributed Hebb Neural Network for Network Anomaly Detection. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Scaling up, Neural network, Intrusion detection system, Distributed learning
14Qinghua Wang 0001, Tingting Zhang Detecting Anomaly Node Behavior in Wireless Sensor Networks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Dan Gunter, Brian Tierney, Aaron Brown, D. Martin Swany, John Bresnahan, Jennifer M. Schopf Log summarization and anomaly detection for troubleshooting distributed systems. Search on Bibsonomy GRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Vasilis Chatzigiannakis, Georgios Androulidakis, K. Pelechrinis, Symeon Papavassiliou, Vasilis Maglaris Data fusion algorithms for network anomaly detection: classification and evaluation. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Qi Zhang 0012, Ludmila Cherkasova, Guy Mathews, Wayne Greene, Evgenia Smirni R-Capriccio: A Capacity Planning and Anomaly Detection Tool for Enterprise Services with Live Workloads. Search on Bibsonomy Middleware The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ziming Zheng, Yawei Li, Zhiling Lan Anomaly localization in large-scale clusters. Search on Bibsonomy CLUSTER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jun Lv, Xing Li, Tong Li 0002 Web-Based Application for Traffic Anomaly Detection Algorithm. Search on Bibsonomy ICIW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14David Y. Oshima On Factive Islands: Pragmatic Anomaly vs. Pragmatic Infelicity. Search on Bibsonomy JSAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Alberto Carrascal, Jorge Couchet, Enrique D. Ferreira 0001, Daniel Manrique Anomaly Detection using prior knowledge: application to TCP/IP traffic. Search on Bibsonomy IFIP AI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Carmen E. Au, Sandra Skaff, James J. Clark Anomaly Detection for Video Surveillance Applications. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh Baseline Profile Stability for Network Anomaly Detection. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Xiaotao Wei, Houkuan Huang, Shengfeng Tian A Modified RBF Neural Network for Network Anomaly Detection. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Zhongxue Yang, Adem Karahoca An Anomaly Intrusion Detection Approach Using Cellular Neural Networks. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Mining, Intrusion detection system, Cellular Neural Networks
14Takeshi Okamoto, Yoshiteru Ishida Towards an Immunity-Based Anomaly Detection System for Network Traffic. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Sang Hoon Chi, Tae Ho Cho Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Hongyu Yang, Feng Xie, Yi Lu Clustering and Classification Based Anomaly Detection. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jean-Michel Gaucel, Mireille Guillaume, Salah Bourennane Non Orthogonal Component Analysis: Application to Anomaly Detection. Search on Bibsonomy ACIVS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Seong Soo Kim, A. L. Narasimha Reddy An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Hyun Joo Kim, Jung-Chan Na, Jong-Soo Jang Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Shivani Deshpande, Marina Thottan, Tin Kam Ho, Biplab Sikdar 0001 A Statistical Approach to Anomaly Detection in Interdomain Routing. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jeff Furlong, Atanas Radenski Handling the subclassing anomaly with Object Teams. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Java
14Suseela T. Sarasamma, Qiuming A. Zhu, Julie Huff Hierarchical Kohonenen net for anomaly detection in network security. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Yousof Al-Hammadi, Christopher Leckie Anomaly detection for Internet worms. Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Zhouyu Fu, Weiming Hu, Tieniu Tan Similarity based vehicle trajectory clustering and anomaly detection. Search on Bibsonomy ICIP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Chi-Ho Tsang, Sam Kwong, Hanli Wang Anomaly Intrusion Detection Using Multi-Objective Genetic Fuzzy System and Agent-Based Evolutionary Computation Framework. Search on Bibsonomy ICDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Dinkar Mylaraswamy Anomaly Detection in a Multi-engine Aircraft. Search on Bibsonomy PReMI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ja-Min Koo, Sung-Bae Cho Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System. Search on Bibsonomy PReMI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ravi Musunuri, Jorge Arturo Cobb Comprehensive Solution for Anomaly-Free BGP. Search on Bibsonomy IPOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Wenliang Du, Lei Fang, Peng Ning LAD: Localization Anomaly Detection forWireless Sensor Networks. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Dong Seong Kim 0001, Ha-Nam Nguyen, Syng-Yup Ohn, Jong Sou Park Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. Search on Bibsonomy ISNN (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Toru Konno, Masamichi Tateoka Accuracy Improvement of Anomaly-Based Intrusion Detection System Using Taguchi Method. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14I. Finizio, Claudio Mazzariello, Carlo Sansone Combining Genetic-Based Misuse and Anomaly Detection for Reliably Detecting Intrusions in Computer Networks. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14En Cheng, Hai Jin 0001, Zongfen Han, Jianhua Sun 0002 Network-Based Anomaly Detection Using an Elman Network. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Xiao-Feng Wang, Jing-Li Zhou, Sheng-Sheng Yu, Long-Zheng Cai Data Mining Methods for Anomaly Detection of HTTP Request Exploitations. Search on Bibsonomy FSKD (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Adnan Agbaria, Roy Friedman A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion Detection and Recovery. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14David R. B. Stockwell, Jason T. L. Wang Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Wei Lu 0018, Issa Traoré A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Wilson Tsang, Sam Kwong Unsupervised Anomaly Intrusion Detection Using Ant Colony Clustering Model. Search on Bibsonomy WSTST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ilker Onat, Ali Miri A Real-Time Node-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks. Search on Bibsonomy Systems Communications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Fenghua Lang, Jian Li, Yixian Yang A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm. Search on Bibsonomy ICMLC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Mario Lemes Proença Jr., Bruno Bogaz Zarpelão, Leonardo de Souza Mendes Anomaly Detection for Network Servers Using Digital Signature of Network Segment. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Seong-sik Hong, Hwang-Bin Ryou Anomaly Detection Using Sequential Properties of Packets in Mobile Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Kathia Regina L. Jucá, Azzedine Boukerche, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare Human Immune Anomaly and Misuse Based Detection for Computer System Operations: PART II. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Fernando Niño, D. Gómez, R. Vejar A Novel Immune Anomaly Detection Technique Based on Negative Selection. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license