|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Pierrick Chatillon, Coloma Ballester |
History-Based Anomaly Detector: An Adversarial Approach to Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IntelliSys (1) ![In: Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference, IntelliSys 2020, London, UK, September 3-4, 2020, Volume 1, pp. 761-776, 2020, Springer, 978-3-030-55179-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Salma El Hajjami, Jamal Malki, Mohammed Berrada, Bouziane Fourka |
Machine Learning for anomaly detection. Performance study considering anomaly distribution in an imbalanced dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cloudtech ![In: 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020, Marrakesh, Morocco, November 24-26, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-6175-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Cong Gao 0002, Yanping Chen 0006, Zhongmin Wang, Hong Xia, Ning Lv |
Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: International Conference on Networking and Network Applications, NaNA 2020, Haikou City, China, December 10-13, 2020, pp. 229-232, 2020, IEEE, 978-1-7281-8954-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Gunupudi Rajesh Kumar, Gugulothu Narsimha, Nimmala Mangathayaru |
An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Technol. Web Eng. ![In: Int. J. Inf. Technol. Web Eng. 14(4), pp. 19-49, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Thibaud Ehret, Axel Davy, Mauricio Delbracio, Jean-Michel Morel |
How to Reduce Anomaly Detection in Images to Anomaly Detection in Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Image Process. Line ![In: Image Process. Line 9, pp. 391-412, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Ning Huyan, Xiangrong Zhang, Huiyu Zhou 0001, Licheng Jiao |
Hyperspectral Anomaly Detection via Background and Potential Anomaly Dictionaries Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 57(4), pp. 2263-2276, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Tian Dai, Lingjuan Miao, Haijun Shao |
A robust underwater navigation method fusing data of gravity anomaly and magnetic anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Sci. ![In: Int. J. Syst. Sci. 50(4), pp. 679-693, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Pierrick Chatillon, Coloma Ballester |
History-based Anomaly Detector: an Adversarial Approach to Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.11843, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Yuma Koizumi, Shoichiro Saito, Masataka Yamaguchi, Shin Murata, Noboru Harada |
Batch Uniformization for Minimizing Maximum Anomaly Score of DNN-based Anomaly Detection in Sounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.08338, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Xuhong Wang, Ying Du, Shijie Lin, Ping Cui, Yupu Yang |
Self-adversarial Variational Autoencoder with Gaussian Anomaly Prior Distribution for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.00904, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Dong Gong, Lingqiao Liu, Vuong Le, Budhaditya Saha, Moussa Reda Mansour, Svetha Venkatesh, Anton van den Hengel |
Memorizing Normality to Detect Anomaly: Memory-augmented Deep Autoencoder for Unsupervised Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.02639, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Dong Gong, Lingqiao Liu, Vuong Le, Budhaditya Saha, Moussa Reda Mansour, Svetha Venkatesh, Anton van den Hengel |
Memorizing Normality to Detect Anomaly: Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: 2019 IEEE/CVF International Conference on Computer Vision, ICCV 2019, Seoul, Korea (South), October 27 - November 2, 2019, pp. 1705-1714, 2019, IEEE, 978-1-7281-4803-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Yuma Koizumi, Shoichiro Saito, Masataka Yamaguchi, Shin Murata, Noboru Harada |
Batch Uniformization for Minimizing Maximum Anomaly Score of Dnn-Based Anomaly Detection in Sounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASPAA ![In: 2019 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, WASPAA 2019, New Paltz, NY, USA, October 20-23, 2019, pp. 6-10, 2019, IEEE, 978-1-7281-1123-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Chengcheng Li, Qing Xu 0002, Cheng Peng, Yuejun Guo 0001 |
Anomaly Detection Based on the Global-Local Anomaly Score for Trajectory Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (5) ![In: Neural Information Processing - 26th International Conference, ICONIP 2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part V, pp. 275-285, 2019, Springer, 978-3-030-36801-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Nicolas Aussel |
Real-time anomaly detection with in-flight data: streaming anomaly detection with heterogeneous communicating agents. (Détection des anomalies sur les données en vol en temps réel avec des agents communicants hétérogènes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
14 | Shizhen Chang, Bo Du 0001, Liangpei Zhang 0001 |
BASO: A Background-Anomaly Component Projection and Separation Optimized Filter for Anomaly Detection in Hyperspectral Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 56(7), pp. 3747-3761, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Zahra Moayed, Reinhard Klette |
Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Vis. Image Underst. ![In: Comput. Vis. Image Underst. 172, pp. 88-97, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | James Zhang, Ilija Vukotic, Robert W. Gardner |
Anomaly detection in wide area network mesh using two machine learning anomaly detection algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1801.10094, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
14 | Cédric Fayet, Arnaud Delhay, Damien Lolive, Pierre-François Marteau |
EMO&LY (EMOtion and AnomaLY) : A new corpus for anomaly detection in an audiovisual stream with emotional context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation, LREC 2018, Miyazaki, Japan, May 7-12, 2018., 2018, European Language Resources Association (ELRA). The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
14 | Aoqian Zhang, Shaoxu Song, Jianmin Wang 0001, Philip S. Yu |
Time Series Data Cleaning: From Anomaly Detection to Anomaly Repairing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. VLDB Endow. ![In: Proc. VLDB Endow. 10(10), pp. 1046-1057, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Ryo Fujita, Takashi Yoshimi |
A study on anomaly prediction method of machine tools - Feature extraction for anomaly prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASCC ![In: 11th Asian Control Conference, ASCC 2017, Gold Coast, Australia, December 17-20, 2017, pp. 1505-1508, 2017, IEEE, 978-1-5090-1573-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Eduardo Fernandes, Gustavo Vale, Leonardo da Silva Sousa, Eduardo Figueiredo 0001, Alessandro Garcia 0001, Jaejoon Lee |
No Code Anomaly is an Island - Anomaly Agglomeration as Sign of Product Line Instabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSR ![In: Mastering Scale and Complexity in Software Reuse - 16th International Conference on Software Reuse, ICSR 2017, Salvador, Brazil, May 29-31, 2017, Proceedings, pp. 48-64, 2017, 978-3-319-56855-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Rasha F. Kashef |
Ensemble-Based Anomaly Detetction using Cooperative Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 43-55, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | Nong Ye |
Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 20-32, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | Michelle R. Miller, Robert Cezeaux |
Sleuthing for adverse outcomes: Using anomaly detection to identify unusual behaviors of third-party agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 121-125, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | Archana Anandakrishnan, Senthil Kumar, Alexander R. Statnikov, Tanveer A. Faruquie, Di Xu |
Anomaly Detection in Finance: Editors' Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 1-7, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | Matthew Adelsberg, Christian Schwantes |
Binned Kernels for Anomaly Detection in Multi-timescale Data using Gaussian Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 102-113, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | David Love, Nalin Aggarwal, Alexander R. Statnikov, Chao Yuan |
An Automated System for Data Attribute Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 95-101, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | Meir Toledano, Ira Cohen, Yonatan Ben-Simhon, Inbal Tadeski |
Real-time anomaly detection system for time series at scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADF@KDD ![In: Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, ADF@KDD 2017, Halifax, Nova Scotia, Canada, August 14, 2017, pp. 56-65, 2017, PMLR. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
14 | Derek Farren, Thai Pham, Marco Alban-Hidalgo |
Low Latency Anomaly Detection and Bayesian Network Prediction of Anomaly Likelihood. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1611.03898, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
14 | Alexander Lavin, Subutai Ahmad |
Evaluating Real-time Anomaly Detection Algorithms - the Numenta Anomaly Benchmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1510.03336, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
14 | Alexander Lavin, Subutai Ahmad |
Evaluating Real-Time Anomaly Detection Algorithms - The Numenta Anomaly Benchmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: 14th IEEE International Conference on Machine Learning and Applications, ICMLA 2015, Miami, FL, USA, December 9-11, 2015, pp. 38-44, 2015, IEEE, 978-1-5090-0287-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Florin Vancea, Codruta Vancea |
NEAR - Network extractor of anomaly records or traffic split-counting for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013, pp. 60-64, 2013, IEEE, 978-1-4673-2230-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Angelo Coluccia, Alessandro D'Alconzo, Fabio Ricciato |
Distribution-Based Anomaly Detection in Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Traffic Monitoring and Analysis ![In: Data Traffic Monitoring and Analysis - From Measurement, Classification, and Anomaly Detection to Quality of Experience, pp. 202-216, 2013, Springer, 978-3-642-36783-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Christian Callegari, Angelo Coluccia, Alessandro D'Alconzo, Wendy Ellens, Stefano Giordano, Michel Mandjes, Michele Pagano, Teresa Pepe, Fabio Ricciato, Piotr Zuraniewski |
A Methodological Overview on Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Traffic Monitoring and Analysis ![In: Data Traffic Monitoring and Analysis - From Measurement, Classification, and Anomaly Detection to Quality of Experience, pp. 148-183, 2013, Springer, 978-3-642-36783-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Siamak Moazezi, Hossein Zomorrodian |
GGMCalc a software for calculation of the geoid undulation and the height anomaly using the iteration method, and classical gravity anomaly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Earth Sci. Informatics ![In: Earth Sci. Informatics 5(2), pp. 123-136, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
14 | Hao Huang, Hong Qin 0001, Shinjae Yoo, Dantong Yu |
Local anomaly descriptor: a robust unsupervised algorithm for anomaly detection based on diffusion space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: 21st ACM International Conference on Information and Knowledge Management, CIKM'12, Maui, HI, USA, October 29 - November 02, 2012, pp. 405-414, 2012, ACM, 978-1-4503-1156-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
14 | Colin O'Reilly, Alexander Gluhak, Muhammad Ali Imran 0001, Sutharshan Rajasegarar |
Online anomaly rate parameter tracking for anomaly detection in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012, Seoul, Korea (South), June 18-21, 2012, pp. 191-199, 2012, IEEE, 978-1-4673-1904-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
14 | Yifat Yulevich, Alex Pyasik, Leonid Gorelik |
Anomaly Detection Algorithms on IBM InfoSphere Streams: Anomaly Detection for Data in Motion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012, Leganes, Madrid, Spain, July 10-13, 2012, pp. 301-308, 2012, IEEE Computer Society, 978-1-4673-1631-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
14 | Shin Ando, Einoshin Suzuki, Yoichi Seki, Theerasak Thanongphongphan, Daisuke Hoshino |
ACE: Anomaly Clustering Ensemble for Multi-perspective Anomaly Detection in Robot Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SDM ![In: Proceedings of the Eleventh SIAM International Conference on Data Mining, SDM 2011, April 28-30, 2011, Mesa, Arizona, USA, pp. 1-12, 2011, SIAM / Omnipress, 978-0-89871-992-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
14 | Johan Mazel, Pedro Casas, Yann Labit, Philippe Owezarski |
Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-1588-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
14 | Romain Fontugne, Pierre Borgnat, Patrice Abry, Kensuke Fukuda |
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010, pp. 8, 2010, ACM, 978-1-4503-0448-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Szabolcs Ferenczi |
Guarded Methods Vs. Inheritance Anomaly: Inheritance Anomaly Solved by Nested Guarded Method Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 30(2), pp. 49-58, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
12 | Lei Shi, Vandana Pursnani Janeja |
Anomalous Window Discovery for Linear Intersecting Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 23(12), pp. 1857-1871, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
spatial scan window, linear scan statistic, anomaly detection, Spatial scan statistics |
12 | Joseph Idziorek, Mark Tannian |
Exploiting Cloud Utility Models for Profit and Ruin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 33-40, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
utility compute model, fraudulent resource consumption attack, application-layer DDoS, cloud computing, anomaly detection |
12 | Hesam Sagha, José del R. Millán, Ricardo Chavarriaga |
Detecting and Rectifying Anomalies in Body Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BSN ![In: International Conference on Body Sensor Networks, BSN 2011, Dallas, Texas, USA, 23-25 May, 2011, pp. 162-167, 2011, IEEE, 978-1-4577-0469-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
intelligent sensor nodes, onbody sensor network, anomaly detection, Activity recognition, compensation, classifier fusion |
12 | Moriteru Ishida, Hiroki Takakura, Yasuo Okabe |
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 11-19, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
anomaly based IDS, OptiGrid, clustering, intrusion detection system, cluster labelling |
12 | Nan Li, Zhimin Zhang |
Abnormal Crowd Behavior Detection Using Topological Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel & Distributed Computing, SNPD 2011, Sydney, Australia, July 6-8, 2011, pp. 13-18, 2011, IEEE Computer Society, 978-1-4577-0896-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Crowd anomaly detection, vector field, topological simplification |
12 | Wei Yu 0002, Nan Zhang 0004, Xinwen Fu, Wei Zhao 0001 |
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 21(10), pp. 1501-1514, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
game theory, anomaly detection, Worm |
12 | João Paulo Magalhães, Luís Moura Silva |
Detection of Performance Anomalies in Web-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, NCA 2010, July 15-17, 2010, Cambridge, Massachusetts, USA, pp. 60-67, 2010, IEEE Computer Society, 978-1-4244-7628-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Fail-Stutter Model, AOP Monitoring, Dependability, Performance Anomaly |
12 | George Chin Jr., Sutanay Choudhury, Lars Kangas, Sally McFarlane, Andrès Márquez |
Fault Detection in Distributed Climate Sensor Networks Using Dynamic Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Sixth International Conference on e-Science, e-Science 2010, 7-10 December 2010, Brisbane, QLD, Australia, pp. 121-128, 2010, IEEE Computer Society, 978-1-4244-8957-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
climate data, anomaly detection, fault detection, dynamic Bayesian networks, distributed sensor networks |
12 | Pedro Henriques dos Santos Teixeira, Ricardo Gomes Clemente, Ronald Andreu Kaiser, Denis Almeida Vieira Jr. |
HOLMES: an event-driven solution to monitor data centers through continuous queries and machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS 2010, Cambridge, United Kingdom, July 12-15, 2010, pp. 216-221, 2010, ACM, 978-1-60558-927-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
monitoring, data streams, anomaly detection, complex event processing, messaging-oriented middleware |
12 | Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan |
ASTUTE: detecting a different class of traffic anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 267-278, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
anomaly detection, statistical test |
12 | David R. Choffnes, Fabián E. Bustamante, Zihui Ge |
Crowdsourcing service-level network event monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 387-398, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
service-level network events, P2P, anomaly detection, crowdsourcing |
12 | Yu Ke Fang, Yan Fu, Junlin Zhou |
Research of Outlier Mining Based Adaptive Intrusion Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 552-555, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Artificial intelligence, Intrusion detection, Anomaly detection, Self-Adaptive, Outlier mining |
12 | Khoi-Nguyen Tran, Huidong Jin 0001 |
Detecting Network Anomalies in Mixed-Attribute Data Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 383-386, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
C4.5 decision tree, Anomaly detection, Gaussian mixture model |
12 | Zihui Che, Xueyun Ji |
An Efficient Intrusion Detection Approach Based on Hidden Markov Model and Rough Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 476-479, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Rough Set Reduction, Decision Condition, Hidden Markov Model, Anomaly Detection, System Call |
12 | Robin Sommer, Vern Paxson |
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 305-316, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, network security, anomaly detection |
12 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca |
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 1037-1046, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ruleset, management, diagnosis, detection, firewall, minimal, conflict, inconsistency, anomaly, acl |
12 | Bin Xin 0001, Patrick Th. Eugster, Xiangyu Zhang 0001, Jinlin Yang |
Lightweight Task Graph Inference for Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31 - November 3, 2010, pp. 100-110, 2010, IEEE Computer Society, 978-0-7695-4250-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
distributed computing, anomaly detection, task graphs, log analysis, happens-before |
12 | Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly |
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 26-39, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks |
12 | Zhengmin Xia, Songnian Lu, Jianhua Li 0001, Jin Ma |
Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 383-392, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anomaly detection, Time series, Self-similarity, Network traffic, Hurst parameter |
12 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 23-30, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
12 | Iren Lorenzo-Fonseca, Francisco Maciá Pérez, Francisco José Mora-Gimeno, Rogelio Lau-Fernández, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera |
Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (1) ![In: Bio-Inspired Systems: Computational and Ambient Intelligence, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009, Salamanca, Spain, June 10-12, 2009. Proceedings, Part I, pp. 1296-1303, 2009, Springer, 978-3-642-02477-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Neural networks, Intrusion detection, Principal component analysis, Anomaly detection |
12 | Khadija Houerbi Ramah, Kavé Salamatian, Farouk Kamoun |
Scan Surveillance in Internet Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 614-625, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
scan monitoring, Networks, anomaly detection, Information Theory |
12 | Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier |
A general framework for adaptive and online detection of web attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 1141-1142, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, intrusion detection, anomaly detection |
12 | Yang Li 0002, Tianbo Lu, Li Guo 0001, Zhihong Tian, Qin-Wu Nie |
Towards lightweight and efficient DDOS attacks detection for web server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 1139-1140, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
E-FCM algorithm, TCM-KNN algorithm, web server anomaly detection, instance selection |
12 | Pavan Vatturi, Weng-Keen Wong |
Category detection using hierarchical mean shift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 847-856, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
category detection, clustering, anomaly detection, mean shift |
12 | Murat Dundar, E. Daniel Hirleman, Arun K. Bhunia, J. Paul Robinson, Bartek Rajwa |
Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 279-288, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
bacteria detection, nonexhaustive learning, anomaly detection, novelty detection, bayes classifier |
12 | Charlie Isaksson, Margaret H. Dunham |
A Comparative Study of Outlier Detection Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 6th International Conference, MLDM 2009, Leipzig, Germany, July 23-25, 2009. Proceedings, pp. 440-453, 2009, Springer, 978-3-642-03069-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data mining, detection, outlier, anomaly |
12 | Yu Jin 0001, Esam Sharafuddin, Zhi-Li Zhang |
Unveiling core network-wide communication patterns through application traffic activity graph decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2009, Seattle, WA, USA, June 15-19, 2009, pp. 49-60, 2009, ACM, 978-1-60558-511-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
application classification, traffic graph, anomaly detection, graph decomposition, nonnegative matrix factorization |
12 | Mohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth |
A Data Mining Approach for Detection of Self-Propagating Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 24-29, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
self-propagating worm, worm detector, signature based detector, anomaly detector |
12 | Farah Barika Ktata, Nabil El-Kadhi, Khaled Ghédira |
Distributed Agent Architecture for Intrusion Detection Based on New Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 321-327, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
metrics, agent architecture, Anomaly, Network Intrusion Detection System |
12 | Lei Liu 0021, Guanhua Yan, Xinwen Zhang, Songqing Chen |
VirusMeter: Preventing Your Cellphone from Spies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 244-264, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile malware, mobile device security, anomaly detection, power consumption |
12 | Yang Cai, Rafael de M. Franco |
Interactive Visualization of Network Anomalous Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (1) ![In: Computational Science - ICCS 2009, 9th International Conference, Baton Rouge, LA, USA, May 25-27, 2009, Proceedings, Part I, pp. 450-459, 2009, Springer, 978-3-642-01969-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network anomaly, anomalous event, clustering, visualization, interaction |
12 | Pham Van Dung, Marat Zhanikeev, Yoshiaki Tanaka |
Traffic Trace Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 1-10, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Simulation, Analysis, Emulation, Trace, Traffic, Replay, Anomaly |
12 | Marat Zhanikeev, Yoshiaki Tanaka |
Lightweight Traffic Monitoring and Analysis Using Video Compression Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 92-101, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IP space, anomaly detection, video compression, traffic analysis, traffic monitoring |
12 | Yoohee Cho, Koohong Kang, Ikkyun Kim, Kitae Jeong |
Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 385-394, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intrusion Detection, DDoS attack, Anomaly |
12 | Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang |
A new method for intrusion detection on hierarchical wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 238-245, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attack behaviors, wireless sensor networks, intrusion detection, anomaly detection, countermeasures |
12 | Wei Wang 0012, Xiangliang Zhang 0001, Sylvain Gombault, Svein J. Knapskog |
Attribute Normalization in Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, ISPAN 2009, Kaohsiung, Taiwan, December 14-16, 2009, pp. 448-453, 2009, IEEE Computer Society, 978-0-7695-3908-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Intrusion detection, PCA, anomaly detection, data normalization |
12 | Deyong Hu, Bin Wu 0001, Qi Ye, Bai Wang 0001 |
Structure Correlation in Mobile Call Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 479-486, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Clique Size Vector, Visualization, Social Network, Correlation, Anomaly, Structural Property |
12 | Ehsan Fazl Ersi, John K. Tsotsos |
Region Classification for Robust Floor Detection in Indoor Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, 6th International Conference, ICIAR 2009, Halifax, Canada, July 6-8, 2009. Proceedings, pp. 717-726, 2009, Springer, 978-3-642-02610-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Floor anomaly detection, Homography, Stereo imaging, Obstacle detection |
12 | Alberto Carrascal, Alberto Díez, Ander Azpeitia |
Unsupervised Methods for Anomalies Detection through Intelligent Monitoring Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAIS ![In: Hybrid Artificial Intelligence Systems, 4th International Conference, HAIS 2009, Salamanca, Spain, June 10-12, 2009. Proceedings, pp. 137-144, 2009, Springer, 978-3-642-02318-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Unsupervised Anomaly Detection, Intelligent Monitoring Systems, Clustering, Unsupervised Classification |
12 | Li Wei 0001, Eamonn J. Keogh, Xiaopeng Xi, Melissa Yoder |
Efficiently finding unusual shapes in large image databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 17(3), pp. 343-376, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anomaly detection, Shape, Rotation invariance |
12 | Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya |
Internet traffic behavior profiling for network security monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(6), pp. 1241-1252, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anomaly behavior, monitoring, traffic profiling |
12 | Taejoon Park, Kang G. Shin |
Attack-tolerant localization via iterative verification of locations in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 8(1), pp. 2:1-2:24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attack-tolerance, sensor networks, localization, Anomaly detection, recursive least squares |
12 | Ashish Kamra, Evimaria Terzi, Elisa Bertino |
Detecting anomalous access patterns in relational databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 17(5), pp. 1063-1077, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Anomaly detection, RBAC, DBMS, User profiles |
12 | Min Li, Shunzheng Yu, Li He |
Detecting Network-Wide Traffic Anomalies Based on Spatial HMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 198-203, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network-wide, HMM, anomaly detection |
12 | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho |
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 352-359, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network security, anomaly detection, security evaluation, Markov Reward Models |
12 | Virgilijus Sakalauskas, Dalia Kriksciuniene |
Neural Networks Approach to the Detection of Weekly Seasonality in Stock Trading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2008, 9th International Conference, Daejeon, South Korea, November 2-5, 2008, Proceedings, pp. 444-451, 2008, Springer, 978-3-540-88905-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
day-of-the-week anomaly, mean return, artificial neural networks, RBF, MLP, stock market |
12 | Hong Wang, Zhenghu Gong, Qing Guan, Baosheng Wang |
Detection Network Anomalies Based on Packet and Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 497-502, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multistage filter, anomaly detection, flow analysis |
12 | Krzysztof Fabjanski, Tomasz Kruk |
Network Traffic Classification by Common Subsequence Finding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (1) ![In: Computational Science - ICCS 2008, 8th International Conference, Kraków, Poland, June 23-25, 2008, Proceedings, Part I, pp. 499-508, 2008, Springer, 978-3-540-69383-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
common subsequence finding, bioinformatics algorithms, Clustal algorithm, Center Star method, automated generation of network attack signatures, anomaly detection, network intrusion detection systems, network traffic analysis |
12 | Khalil A. Abuosba, Clemens Martin |
Defusing Intrusion Capabilities by Collaborative Anomalous Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2008, Rome, Italy, June 23-25, 2008, Proceedings, pp. 263-268, 2008, IEEE Computer Society, 978-0-7695-3315-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, trust, management, Distributed, systems, anomaly |
12 | Valentin Zacharias |
Tackling the Debugging Challenge of Rule Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS ![In: Enterprise Information Systems, 10th International Conference, ICEIS 2008, Barcelona, Spain, June 12-16, 2008, Revised Selected Papers, pp. 144-154, 2008, Springer, 978-3-642-00669-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
F-logic, Verification, Anomaly detection, Knowledge acquisition, Rule based systems, Knowledge modeling, Rule based modeling |
12 | Oren Boiman, Michal Irani |
Detecting Irregularities in Images and in Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 74(1), pp. 17-31, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
detecting suspicious behaviors, detecting irregularities, anomaly detection, novelty detection, saliency, action recognition, automatic visual inspection |
12 | Fabrizio Angiulli, Fabio Fassetti |
Very efficient mining of distance-based outliers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, CIKM 2007, Lisbon, Portugal, November 6-10, 2007, pp. 791-800, 2007, ACM, 978-1-59593-803-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data mining, anomaly detection, distance-based outliers |
12 | Fabrizio Angiulli, Fabio Fassetti |
Detecting distance-based outliers in streams of data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, CIKM 2007, Lisbon, Portugal, November 6-10, 2007, pp. 811-820, 2007, ACM, 978-1-59593-803-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data streams, anomaly detection, distance-based outliers |
12 | Denis Collange, Jean-Laurent Costeux |
Correlation of Packet Losses with Some Traffic Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 8th Internatinoal Conference, PAM 2007, Louvain-la-neuve, Belgium, April 5-6, 2007, Proceedings, pp. 233-236, 2007, Springer, 978-3-540-71616-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Passive performance measurements, statistical correlation, anomaly detection, ADSL |
12 | Michael D. Bond, Kathryn S. McKinley |
Probabilistic calling context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2007, October 21-25, 2007, Montreal, Quebec, Canada, pp. 97-112, 2007, ACM, 978-1-59593-786-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly-based bug detection, dynamic context sensitivity, residual testing, intrusion detection, probabilistic, calling context, managed languages |
12 | Wenxiong Kang, Feiqi Deng |
Research on Intelligent Visual Surveillance for Public Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 824-829, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Behavior understanding, Anomaly detection, Visual Surveillance, Multiple cameras, Occlusion handling |
|
|