|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Lisa Friedland, David D. Jensen |
Finding tribes: identifying close-knit individuals from employment patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 290-299, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
social networks, anomaly detection, dynamic networks |
12 | Gaurav Tandon, Philip K. Chan |
Weighting versus pruning in rule validation for detecting network and host anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 697-706, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rule pruning, rule weighting, machine learning, anomaly detection |
12 | Yiyi Huang, Nick Feamster, Anukool Lakhina, Jun (Jim) Xu |
Diagnosing network disruptions with network-wide analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2007, San Diego, California, USA, June 12-16, 2007, pp. 61-72, 2007, ACM, 978-1-59593-639-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, network management, statistical inference |
12 | Daniel A. Ray, Phillip G. Bradford |
An Integrated System for Insider Threat Detection. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 75-86, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proactive forensics, anomaly detection, Insider threats |
12 | Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi |
Masquerade Detection Based Upon GUI User Profiling in Linux Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 228-239, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GUI based Profiling, Mouse events, KDE, Linux Profiling, Intrusion detection, Anomaly detection, One-class SVM, Masquerade detection |
12 | Ali Borji |
Combining Heterogeneous Classifiers for Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 254-260, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection, PCA, Anomaly Detection, Combined Classifiers, Misuse Detection |
12 | Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira |
Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France, pp. 97, 2007, IEEE Computer Society, 978-0-7695-2805-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multi-Stage Network Anomaly Detection, Change-Point Detection, Large-Scale Simultaneous Event, Worm, Virus |
12 | Marcus A. Maloof, Gregory D. Stephens |
elicit: A System for Detecting Insiders Who Violate Need-to-Know. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 146-166, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, insider threat, misuse |
12 | M. Patrick Collins, Michael K. Reiter |
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 276-295, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anomaly detection, Graph analysis, Large networks |
12 | István Petrás, Csaba Beleznai, Yigithan Dedeoglu, Montse Pardàs, Levente Kovács, Zoltán Szlávik, Laszlo Havasi, Tamás Szirányi, B. Ugur Töreyin, Ugur Güdükbay, A. Enis Çetin, Cristian Canton-Ferrer |
Flexible test-bed for unusual behavior detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIVR ![In: Proceedings of the 6th ACM International Conference on Image and Video Retrieval, CIVR 2007, Amsterdam, The Netherlands, July 9-11, 2007, pp. 105-108, 2007, ACM, 978-1-59593-733-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed system, anomaly detection, event detection, visual surveillance |
12 | Yu Jin 0001, Zhi-Li Zhang, Kuai Xu, Feng Cao, Sambit Sahu |
Identifying and tracking suspicious activities through IP gray space analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, MineNet 2007, San Diego, California, USA, June 12, 2007, pp. 7-12, 2007, ACM, 978-1-59593-792-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IP gray space, entropy, anomaly detection, profiling, network traffic analysis |
12 | Yanna Shen, Gregory F. Cooper |
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioSurveillance ![In: Intelligence and Security Informatics: Biosurveillance, Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007, Proceedings., pp. 209-215, 2007, Springer, 978-3-540-72607-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anomaly detection, Bayesian methods, biosurveillance |
12 | Paul C. van Oorschot, Jean-Marc Robert 0001, Miguel Vargas Martin |
A monitoring system for detecting repeated packets with applications to computer worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 186-199, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Anomaly detection, Traffic monitoring, Computer worms |
12 | Matthew Eric Otey, Amol Ghoting, Srinivasan Parthasarathy 0001 |
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 12(2-3), pp. 203-228, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mining dynamic data, mixedattribute data sets, data streams, anomaly detection, outlier detection, distributed data mining |
12 | Andrew Naftel, Shehzad Khalid |
Classifying spatiotemporal object trajectories using unsupervised learning in the coefficient feature space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 12(3), pp. 227-238, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Object trajectory, Event mining, Anomaly detection, Trajectory clustering, Motion classification |
12 | Stefano Lonardi, Jessica Lin 0001, Eamonn J. Keogh, Bill Yuan-chi Chiu |
Efficient Discovery of Unusual Patterns in Time Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Gener. Comput. ![In: New Gener. Comput. 25(1), pp. 61-93, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Feature Extraction, Anomaly Detection, Time Series, Markov Model, Suffix Tree, Novelty Detection |
12 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang 0009 |
Behavior-based modeling and its application to Email analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 6(2), pp. 187-221, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Email virus propagations, anomaly detection, behavior profiling |
12 | William Yurcik |
Tool update: visflowconnect-IP with advanced filtering from usability testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 63-64, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
traffic visualization, intrusion detection, anomaly detection, parallel coordinates, security visualization |
12 | Ioannis Xydas, Georgios Miaoulis, Pierre-François Bonnefoi, Dimitri Plemenos, Djamchid Ghazanfarpour |
3D Graph Visualisation of Web Normal and Malicious Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 10th International Conference on Information Visualisation, IV 2006, 5-7 July 2006, London, UK, pp. 621-629, 2006, IEEE Computer Society, 0-7695-2602-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Web visualisation, web attacks, surveillance aid, neural networks, intrusion detection, network security, expert systems, anomaly detection, web security |
12 | Sheng Zhang 0004, Amit Chakrabarti, James Ford, Fillia Makedon |
Attack detection in time series for recommender systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 809-814, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
shilling attacks, recommender systems, anomaly detection, time series |
12 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 33-40, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
12 | Michael Hilker, Christoph Schommer |
Description of bad-signatures for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 175-182, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
data streams, anomaly detection, artificial immune system, network intrusion detection |
12 | Sheng Zhang 0004, Yi Ouyang 0001, James Ford, Fillia Makedon |
Analysis of a low-dimensional linear model under recommendation attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2006: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, Washington, USA, August 6-11, 2006, pp. 517-524, 2006, ACM, 1-59593-369-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
shilling attacks, recommender systems, collaborative filtering, anomaly detection |
12 | Min Cai, Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Yu Chen 0002 |
Collaborative Internet Worm Containment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(3), pp. 25-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network security, anomaly detection, distributed hash tables, DHT, overlay networks, distributed denial-of-service, DDoS attacks, Internet worms, signature generation |
12 | Stan Salvador, Philip Chan 0001 |
Learning States and Rules for Detecting Anomalies in Time Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 23(3), pp. 241-255, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
clustering, segmentation, anomaly detection, time series, cluster validation |
12 | Alan D. Fekete, Dimitrios Liarokapis, Elizabeth J. O'Neil, Patrick E. O'Neil, Dennis E. Shasha |
Making snapshot isolation serializable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 30(2), pp. 492-528, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multiversion concurrency, weak isolation, Concurrency control, consistency, serializability, anomaly, snapshot isolation |
12 | Alan D. Fekete |
Allocating isolation levels to transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 206-215, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
concurrency control, consistency, serializability, anomaly, two-phase locking, snapshot isolation |
12 | Knut H. Pedersen, Constantinos Constantinides |
AspectAda: aspect oriented programming for ada95. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2005 Annual ACM SIGAda International Conference on Ada: The Engineering of Correct and Reliable Software for Real-Time & Distributed Systems using Ada and Related Technologies 2005, Atlanta, GA, USA, November 13-17, 2005, pp. 79-92, 2005, ACM, 1-59593-185-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ada semantic interface specification (ASIS), aspect-oriented programming (AOP), concurrent programming, inheritance anomaly, ada95 |
12 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Brief announcement: strong detection of misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 40, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong detection, routing, anomaly detection, distance-vector, misconfiguration |
12 | Khalid El-Arini, Kevin S. Killourhy |
Bayesian detection of router configuration anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005, pp. 221-222, 2005, ACM, 1-59593-026-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
router configuration, statistical anomaly detection |
12 | Kenji Yamanishi, Jun'ichi Takeuchi, Graham J. Williams, Peter Milne |
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 8(3), pp. 275-300, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, EM algorithm, outlier detection, fraud detection, finite mixture model |
12 | Victoria J. Hodge, Jim Austin |
A Survey of Outlier Detection Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 22(2), pp. 85-126, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
noise, recognition, detection, outlier, anomaly, novelty, deviation |
12 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 110-120, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
12 | Maja Pusara, Carla E. Brodley |
User re-authentication via mouse movements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 1-8, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
mouse dynamics, user re-authentication, anomaly detection |
12 | Liu Fang, Chen Zhen-guo |
Intrusion Detection Based on Organizational Coevolutionary Fuzzy Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Information Processing ![In: Intelligent Information Processing II, IFIP TC12/WG12.3 International Conference on Intelligent Information Processing (IIP 2004), October 21-23, 2004, Beijing, China, pp. 171-174, 2004, Springer, 0-387-23151-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Organization CoEvolutionary, Fuzzy Logic, Intrusion detection, Anomaly detection |
12 | Jude W. Shavlik, Mark Shavlik |
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 276-285, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Winnow algorithm, machine learning, feature selection, intrusion detection, user modeling, anomaly detection, Windows 2000 |
12 | Jessica Lin 0001, Eamonn J. Keogh, Stefano Lonardi, Jeffrey P. Lankford, Donna M. Nystrom |
Visually mining and monitoring massive time series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 460-469, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
visualization, anomaly detection, time series, pattern discovery, motif discovery |
12 | Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman |
Combining routing and traffic data for detection of IP forwarding anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2004, June 10-14, 2004, New York, NY, USA, pp. 416-417, 2004, ACM, 1-58113-873-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
routing, BGP, SNMP, traffic, network anomaly detection |
12 | Robert T. Schweller, Ashish Gupta 0003, Elliot Parsons, Yan Chen 0004 |
Reversible sketches for efficient and accurate change detection over network data streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 207-212, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IP mangling, data stream computation, modular hashing, reverse hashing, sketch, change detection, network anomaly detection |
12 | Stephen D. Bay, Mark Schwabacher |
Mining distance-based outliers in near linear time with randomization and a simple pruning rule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, 2003, pp. 29-38, 2003, ACM, 1-58113-737-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
diskbased algorithms, distance-based operations, anomaly detection, outliers |
12 | Junshui Ma, Simon Perkins |
Online novelty detection on temporal sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, 2003, pp. 613-618, 2003, ACM, 1-58113-737-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
anomaly detection, online algorithm, support vector regression, novelty detection |
12 | Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham |
Detection of injected, dynamically generated, and obfuscated malicious code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 76-82, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection |
12 | Eamonn J. Keogh, Stefano Lonardi, Bill Yuan-chi Chiu |
Finding surprising patterns in a time series database in linear time and space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 550-556, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
feature extraction, anomaly detection, time series, Markov Model, suffix tree, novelty detection |
12 | Andy J. Wellings, Bob Johnson, Bo Ingvar Sandén, Jörg Kienzle, Thomas Wolf 0013, Stephen Michell |
Integrating object-oriented programming and protected objects in Ada 95. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 22(3), pp. 506-539, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
concurrency, Ada 95, inheritance anomaly, concurrent object-oriented programming |
12 | Thomas Lundqvist, Per Stenström |
Timing Anomalies in Dynamically Scheduled Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 20th IEEE Real-Time Systems Symposium, Phoenix, AZ, USA, December 1-3, 1999, pp. 12-21, 1999, IEEE Computer Society, 0-7695-0475-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
timing anomaly, Real-time systems, resource allocation, timing analysis, worst-case execution time, out-of-order execution, dynamically scheduled processor |
12 | G. Manimaran, C. Siva Ram Murthy |
A Fault-Tolerant Dynamic Scheduling Algorithm for Multiprocessor Real-Time Systems and Its Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 9(11), pp. 1137-1152, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
resource reclaiming, run-time anomaly, fault tolerance, Real-time system, dynamic scheduling, safety critical application |
12 | Stephan Reitzner |
Virtual synchronization: uncoupling synchronization annotations from synchronization code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 1998 ACM symposium on Applied Computing, SAC'98, Atlanta, GA, USA, February 27 - March 1, 1998, pp. 655-659, 1998, ACM, 0-89791-969-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
synchronization, inheritance anomaly, concurrent object oriented programming |
12 | Benjamin M. Brosgol |
A Comparison of the Concurrency Features of Ada 95 and Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the ACM SIGAda Annual International Conference on Ada Technology, SIGAda 1998, Washington, DC, USA, November 8-12, 1998, pp. 175-192, 1998, ACM, 1-58113-033-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Java, Java, Ada, Ada, concurrency, object-oriented programming, threads, tasking, inheritance anomaly |
7 | Vladimir A. Golovko, Sergei V. Bezobrazov, Pavel Kachurka, Leanid U. Vaitsekhovich |
Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Machine Learning II ![In: Advances in Machine Learning II, Dedicated to the Memory of Professor Ryszard S. Michalski, pp. 485-513, 2010, Springer, 978-3-642-05178-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
7 | Dario Rossi 0001, Silvio Valenti |
Fine-grained traffic classification with netflow data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 479-483, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SVM, traffic classification, netflow |
7 | Jingbo Sun, Yue Wang 0007, Hongbo Si, Xia Mao, Jian Yuan, Xiuming Shan |
A PCA-based approach for exploring space-time structure of urban mobility dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 859-863, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
principal component analysis, urban computing, human mobility |
7 | Aruna Jamdagni, Zhiyuan Tan 0001, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu |
Intrusion detection using GSAD model for HTTP traffic on web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1193-1197, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GSAD model, intrusion detection, attack, HTTP, payload |
7 | Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, James Swee Chuan Tan |
Mass estimation and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 989-998, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mass estimation |
7 | Lynda Thomas, Carol Zander, Anna Eckerdal |
Harnessing surprise: tales from students' transformational biographies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 300-304, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
attitudinal factors, student biographies, work experience, transformation, threshold concepts, surprise |
7 | Richard J. Enbody, William F. Punch |
Performance of python CS1 students in mid-level non-python CS courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 520-523, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cs1, curriculum, python, introduction to programming |
7 | Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli |
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPGPU ![In: Proceedings of 3rd Workshop on General Purpose Processing on Graphics Processing Units, GPGPU 2010, Pittsburgh, Pennsylvania, USA, March 14, 2010, pp. 104-110, 2010, ACM, 978-1-60558-935-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
LOF, parallelization, GPU, intrusion detection system |
7 | Kai Shen |
Request behavior variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2010, Pittsburgh, Pennsylvania, USA, March 13-17, 2010, pp. 103-116, 2010, ACM, 978-1-60558-839-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
operating system adaptation, request modeling, server system, multicore, hardware counter |
7 | George G. Cabral, Adriano L. I. Oliveira, Carlos B. G. Cahu |
Combining nearest neighbor data description and structural risk minimization for one-class classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 18(2), pp. 175-183, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Nearest neighbor data description, Prototype reduction, Novelty detection, One-class classification, Structural risk minimization |
7 | Xiao Zhi Gao 0001, Seppo J. Ovaska, Xiaolei Wang 0001, Mo-Yuen Chow |
Clonal optimization-based negative selection algorithm with applications in motor fault detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 18(7), pp. 719-729, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov |
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Res. Dev. ![In: Comput. Sci. Res. Dev. 23(1), pp. 15-25, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Measurement requirements, Intrusion detection, Situation awareness, Network monitoring, Early warning systems |
7 | Yi Xie 0002, Shun-Zheng Yu |
Monitoring the application-layer DDoS attacks for popular websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 15-25, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
popular Website, distributed denial of service (DDoS), application-layer |
7 | Hichem Frigui, Paul D. Gader |
Detection and Discrimination of Land Mines in Ground-Penetrating Radar Based on Edge Histogram Descriptors and a Possibilistic K-Nearest Neighbor Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 17(1), pp. 185-199, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 96-110, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Songyun Duan, Shivnath Babu |
Automated Diagnosis of System Failures with Fa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 1499-1502, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Songyun Duan, Shivnath Babu, Kamesh Munagala |
Fa: A System for Automating Failure Diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 1012-1023, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | William Eberle, Lawrence B. Holder |
Mining for insider threats in business transactions and processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDM ![In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2009, part of the IEEE Symposium Series on Computational Intelligence 2009, Nashville, TN, USA, March 30, 2009 - April 2, 2009, pp. 163-170, 2009, IEEE, 978-1-4244-2765-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Michelangelo Ceci, Annalisa Appice, Corrado Loglisci, Costantina Caruso, Fabio Fumarola, Donato Malerba |
Novelty Detection from Evolving Complex Data Streams with Time Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 18th International Symposium, ISMIS 2009, Prague, Czech Republic, September 14-17, 2009. Proceedings, pp. 563-572, 2009, Springer, 978-3-642-04124-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Jeff Terrell, Kevin Jeffay, F. Donelson Smith, Jim Gogan, Joni Keller |
Passive, Streaming Inference of TCP Connection Structure for Network Server Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TMA ![In: Traffic Monitoring and Analysis, First International Workshop, TMA 2009, Aachen, Germany, May 11, 2009. Proceedings, pp. 42-53, 2009, Springer, 978-3-642-01644-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Ignasi Paredes-Oliva, Pere Barlet-Ros, Josep Solé-Pareta |
Portscan Detection with Sampled NetFlow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TMA ![In: Traffic Monitoring and Analysis, First International Workshop, TMA 2009, Aachen, Germany, May 11, 2009. Proceedings, pp. 26-33, 2009, Springer, 978-3-642-01644-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Daniele Toscani, Marco Frigerio, Diego Bernini |
Dynamic update of data analysis models in emergency systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 37-41, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor data modelling, update strategies, model quality, model update |
7 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 926-930, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
7 | Jiawei Huang 0001, Jianxin Wang 0001 |
An ECN-Based Congestion Control Algorithm for TCP Enhancement in WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 11th IEEE International Conference on High Performance Computing and Communications, HPCC 2009, 25-27 June 2009, Seoul, Korea, pp. 464-469, 2009, IEEE, 978-0-7695-3738-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Fabian Hugelshofer, Paul Smith 0001, David Hutchison 0001, Nicholas J. P. Race |
OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, China, September 20-25, 2009, pp. 309-320, 2009, ACM, 978-1-60558-702-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
performance, intrusion detection, wireless mesh network, resource constrained devices |
7 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 193-207, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Jin Heo, Tarek F. Abdelzaher |
AdaptGuard: guarding adaptive systems from instability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: Proceedings of the 6th International Conference on Autonomic Computing, ICAC 2009, June 15-19, 2009, Barcelona, Spain, pp. 77-86, 2009, ACM, 978-1-60558-564-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adaptation graphs, causality assumptions, adaptive systems |
7 | R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aalst |
Abstractions in Process Mining: A Taxonomy of Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM ![In: Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, September 8-10, 2009. Proceedings, pp. 159-175, 2009, Springer, 978-3-642-03847-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Shengbo Chen |
Remote Sensing Based on Neural Networks Model for Hydrocarbon Potentials Evaluation in Northeast China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (3) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part III, pp. 855-863, 2009, Springer, 978-3-642-01512-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Songliao basin, Landsat TM, Hydrocarbon potentials, Self-organizing neural network |
7 | T. Stephen Markham, Scott C. Evans, Jeremy Impson, Eric Steinbrecher |
Implementation of an Incremental MDL-Based Two Part Compression Algorithm for Model Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCC ![In: 2009 Data Compression Conference (DCC 2009), 16-18 March 2009, Snowbird, UT, USA, pp. 322-331, 2009, IEEE Computer Society, 978-0-7695-3592-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Alexander O. Tarakanov |
Immunocomputing for Geoinformation Fusion and Forecast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Information Fusion and Geographic Information Systems, Proceedings of the Fourth International Workshop, IF&GIS 2009, 17-20 May 2009, St. Petersburg, Russia, pp. 125-134, 2009, Springer, 978-3-642-00303-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Geoinformation fusion, Spatiotemporal modeling, Forecast, Immunocomputing |
7 | Yves Guiard |
The problem of consistency in the design of Fitts' law experiments: consider either target distance and width or movement form and scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 1809-1818, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
movement amplitude, movement difficulty, movement form, movement scale, movement shape, target distance, target tolerance, target width, methodology, theory, Fitts' law, experimental design |
7 | Sakshi Babbar |
Integration of Domain Knowledge for Outlier Detection in High Dimensional Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA Workshops ![In: Database Systems for Advanced Applications, DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD, Brisbane, Australia, April 20-23, 2009, pp. 363-368, 2009, Springer, 978-3-642-04204-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
Exploiting Temporal Persistence to Detect Covert Botnet Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 326-345, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Jaeyong Chung, Henry J. Gardner |
Measuring temporal variation in presence during game playing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRCAI ![In: Proceedings of the 8th International Conference on Virtual Reality Continuum and its Applications in Industry, VRCAI 2009, Yokohama, Japan, December 14-15, 2009, pp. 163-168, 2009, ACM, 978-1-60558-912-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
breaks in presence, computer game, presence |
7 | Gabriel Gómez Sena, Pablo Belzarena |
Early traffic classification using support vector machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LANC ![In: Proceedings of the 5th International Latin American Networking Conference , LANC 2009, Pelotas, Brazil, September 24-25, 2009, pp. 60-66, 2009, ACM, 978-1-60558-775-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
support vector machines, traffic classification, traffic identification |
7 | Jiadong Ren, Changzhen Hu, Kunsheng Wang, Di Wu 0033 |
A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Active Media Technology, 5th International Conference, AMT 2009, Beijing, China, October 22-24, 2009. Proceedings, pp. 409-417, 2009, Springer, 978-3-642-04874-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Alexander W. Min, Kang G. Shin, Xin Hu 0001 |
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009. ICNP 2009, Princeton, NJ, USA, 13-16 October 2009, pp. 294-303, 2009, IEEE Computer Society, 978-1-4244-4634-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Xinjie Lv, Xin Li 0002, Tian Yang, Zaifei Liao, Wei Liu 0023, Hongan Wang |
RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 835-850, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Cristina E. Manfredotti, Enza Messina |
Relational Dynamic Bayesian Networks to Improve Multi-target Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 11th International Conference, ACIVS 2009, Bordeaux, France, September 28 - October 2, 2009. Proceedings, pp. 528-539, 2009, Springer, 978-3-642-04696-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano |
Detection of anomalous packet traffic via entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 137-141, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Amar Kumar, Amiya Nayak, Alka Srivastava, Nita Goel |
Experimental validation of statistical algorithm for diagnosis of damage fault. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 686-690, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Lambert Spaanenburg, Mona Akbarniai Tehrani, Richard P. Kleihorst, Peter B. L. Meijer |
Behavior Modeling by Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part I, pp. 439-448, 2009, Springer, 978-3-642-04273-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3-tier architecture, Sinai billiard system, collision avoidance, Behavioral modeling, convolutional neural network |
7 | James M. Kang, Shashi Shekhar, Michael Henjum, Paige J. Novak, William A. Arnold |
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSTD ![In: Advances in Spatial and Temporal Databases, 11th International Symposium, SSTD 2009, Aalborg, Denmark, July 8-10, 2009, Proceedings, pp. 44-61, 2009, Springer, 978-3-642-02981-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Jessica Lin 0001, Yuan Li |
Finding Structural Similarity in Time Series Data Using Bag-of-Patterns Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: Scientific and Statistical Database Management, 21st International Conference, SSDBM 2009, New Orleans, LA, USA, June 2-4, 2009, Proceedings, pp. 461-477, 2009, Springer, 978-3-642-02278-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data mining, Time series, Similarity Search |
7 | Payas Gupta, Chedy Raïssi, Gérard Dray, Pascal Poncelet, Johan Brissaud |
SS-IDS: Statistical Signature Based IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy, pp. 407-412, 2009, IEEE Computer Society, 978-0-7695-3613-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis |
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 12:1-12:38, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web security, malicious software, distributed attacks |
7 | Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dharma P. Agrawal |
Airtime Fairness for IEEE 802.11 Multirate Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 7(4), pp. 513-527, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Max-Min, Packet Errors, Simulation, Fairness, Throughput, Analytical Model, Multi-rate, Contention Window |
7 | Jimeng Sun 0001, Dacheng Tao, Spiros Papadimitriou, Philip S. Yu, Christos Faloutsos |
Incremental tensor analysis: Theory and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Knowl. Discov. Data ![In: ACM Trans. Knowl. Discov. Data 2(3), pp. 11:1-11:37, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tensor, stream mining, multilinear algebra |
7 | Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu |
Correlating burst events on streaming stock market data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 16(1), pp. 109-133, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Burst detection, Indexing, Time-series, Correlation |
7 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Detecting VoIP Floods Using the Hellinger Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(6), pp. 794-805, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network-level security and protection, Communication/Networking and Information Technology |
7 | Brendan Tran Morris, Mohan M. Trivedi |
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 18(8), pp. 1114-1127, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
|
|