The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for anomaly with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (15) 1983-1987 (15) 1988-1990 (18) 1991-1993 (19) 1994-1995 (15) 1996-1997 (21) 1998 (16) 1999 (18) 2000 (26) 2001 (28) 2002 (51) 2003 (91) 2004 (152) 2005 (219) 2006 (254) 2007 (295) 2008 (359) 2009 (332) 2010 (227) 2011 (283) 2012 (281) 2013 (314) 2014 (383) 2015 (432) 2016 (548) 2017 (640) 2018 (891) 2019 (1190) 2020 (1525) 2021 (1801) 2022 (2287) 2023 (2698) 2024 (623)
Publication types (Num. hits)
article(7536) book(5) data(17) incollection(60) inproceedings(8240) phdthesis(208) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1918 occurrences of 879 keywords

Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Lisa Friedland, David D. Jensen Finding tribes: identifying close-knit individuals from employment patterns. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF social networks, anomaly detection, dynamic networks
12Gaurav Tandon, Philip K. Chan Weighting versus pruning in rule validation for detecting network and host anomalies. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rule pruning, rule weighting, machine learning, anomaly detection
12Yiyi Huang, Nick Feamster, Anukool Lakhina, Jun (Jim) Xu Diagnosing network disruptions with network-wide analysis. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, network management, statistical inference
12Daniel A. Ray, Phillip G. Bradford An Integrated System for Insider Threat Detection. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proactive forensics, anomaly detection, Insider threats
12Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi Masquerade Detection Based Upon GUI User Profiling in Linux Systems. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GUI based Profiling, Mouse events, KDE, Linux Profiling, Intrusion detection, Anomaly detection, One-class SVM, Masquerade detection
12Ali Borji Combining Heterogeneous Classifiers for Network Intrusion Detection. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection, PCA, Anomaly Detection, Combined Classifiers, Misuse Detection
12Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-Stage Network Anomaly Detection, Change-Point Detection, Large-Scale Simultaneous Event, Worm, Virus
12Marcus A. Maloof, Gregory D. Stephens elicit: A System for Detecting Insiders Who Violate Need-to-Know. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, insider threat, misuse
12M. Patrick Collins, Michael K. Reiter Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Graph analysis, Large networks
12István Petrás, Csaba Beleznai, Yigithan Dedeoglu, Montse Pardàs, Levente Kovács, Zoltán Szlávik, Laszlo Havasi, Tamás Szirányi, B. Ugur Töreyin, Ugur Güdükbay, A. Enis Çetin, Cristian Canton-Ferrer Flexible test-bed for unusual behavior detection. Search on Bibsonomy CIVR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed system, anomaly detection, event detection, visual surveillance
12Yu Jin 0001, Zhi-Li Zhang, Kuai Xu, Feng Cao, Sambit Sahu Identifying and tracking suspicious activities through IP gray space analysis. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP gray space, entropy, anomaly detection, profiling, network traffic analysis
12Yanna Shen, Gregory F. Cooper A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases. Search on Bibsonomy BioSurveillance The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, Bayesian methods, biosurveillance
12Paul C. van Oorschot, Jean-Marc Robert 0001, Miguel Vargas Martin A monitoring system for detecting repeated packets with applications to computer worms. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, Network security, Anomaly detection, Traffic monitoring, Computer worms
12Matthew Eric Otey, Amol Ghoting, Srinivasan Parthasarathy 0001 Fast Distributed Outlier Detection in Mixed-Attribute Data Sets. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mining dynamic data, mixedattribute data sets, data streams, anomaly detection, outlier detection, distributed data mining
12Andrew Naftel, Shehzad Khalid Classifying spatiotemporal object trajectories using unsupervised learning in the coefficient feature space. Search on Bibsonomy Multim. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Object trajectory, Event mining, Anomaly detection, Trajectory clustering, Motion classification
12Stefano Lonardi, Jessica Lin 0001, Eamonn J. Keogh, Bill Yuan-chi Chiu Efficient Discovery of Unusual Patterns in Time Series. Search on Bibsonomy New Gener. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feature Extraction, Anomaly Detection, Time Series, Markov Model, Suffix Tree, Novelty Detection
12Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang 0009 Behavior-based modeling and its application to Email analysis. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Email virus propagations, anomaly detection, behavior profiling
12William Yurcik Tool update: visflowconnect-IP with advanced filtering from usability testing. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF traffic visualization, intrusion detection, anomaly detection, parallel coordinates, security visualization
12Ioannis Xydas, Georgios Miaoulis, Pierre-François Bonnefoi, Dimitri Plemenos, Djamchid Ghazanfarpour 3D Graph Visualisation of Web Normal and Malicious Traffic. Search on Bibsonomy IV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web visualisation, web attacks, surveillance aid, neural networks, intrusion detection, network security, expert systems, anomaly detection, web security
12Sheng Zhang 0004, Amit Chakrabarti, James Ford, Fillia Makedon Attack detection in time series for recommender systems. Search on Bibsonomy KDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shilling attacks, recommender systems, anomaly detection, time series
12Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
12Michael Hilker, Christoph Schommer Description of bad-signatures for network intrusion detection. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF data streams, anomaly detection, artificial immune system, network intrusion detection
12Sheng Zhang 0004, Yi Ouyang 0001, James Ford, Fillia Makedon Analysis of a low-dimensional linear model under recommendation attacks. Search on Bibsonomy SIGIR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shilling attacks, recommender systems, collaborative filtering, anomaly detection
12Min Cai, Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Yu Chen 0002 Collaborative Internet Worm Containment. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, anomaly detection, distributed hash tables, DHT, overlay networks, distributed denial-of-service, DDoS attacks, Internet worms, signature generation
12Stan Salvador, Philip Chan 0001 Learning States and Rules for Detecting Anomalies in Time Series. Search on Bibsonomy Appl. Intell. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF clustering, segmentation, anomaly detection, time series, cluster validation
12Alan D. Fekete, Dimitrios Liarokapis, Elizabeth J. O'Neil, Patrick E. O'Neil, Dennis E. Shasha Making snapshot isolation serializable. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multiversion concurrency, weak isolation, Concurrency control, consistency, serializability, anomaly, snapshot isolation
12Alan D. Fekete Allocating isolation levels to transactions. Search on Bibsonomy PODS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concurrency control, consistency, serializability, anomaly, two-phase locking, snapshot isolation
12Knut H. Pedersen, Constantinos Constantinides AspectAda: aspect oriented programming for ada95. Search on Bibsonomy SIGAda The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ada semantic interface specification (ASIS), aspect-oriented programming (AOP), concurrent programming, inheritance anomaly, ada95
12Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein Brief announcement: strong detection of misconfigurations. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong detection, routing, anomaly detection, distance-vector, misconfiguration
12Khalid El-Arini, Kevin S. Killourhy Bayesian detection of router configuration anomalies. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router configuration, statistical anomaly detection
12Kenji Yamanishi, Jun'ichi Takeuchi, Graham J. Williams, Peter Milne On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, EM algorithm, outlier detection, fraud detection, finite mixture model
12Victoria J. Hodge, Jim Austin A Survey of Outlier Detection Methodologies. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF noise, recognition, detection, outlier, anomaly, novelty, deviation
12Kevin Borders, Atul Prakash 0001 Web tap: detecting covert web traffic. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels
12Maja Pusara, Carla E. Brodley User re-authentication via mouse movements. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mouse dynamics, user re-authentication, anomaly detection
12Liu Fang, Chen Zhen-guo Intrusion Detection Based on Organizational Coevolutionary Fuzzy Classifiers. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Organization CoEvolutionary, Fuzzy Logic, Intrusion detection, Anomaly detection
12Jude W. Shavlik, Mark Shavlik Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Winnow algorithm, machine learning, feature selection, intrusion detection, user modeling, anomaly detection, Windows 2000
12Jessica Lin 0001, Eamonn J. Keogh, Stefano Lonardi, Jeffrey P. Lankford, Donna M. Nystrom Visually mining and monitoring massive time series. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF visualization, anomaly detection, time series, pattern discovery, motif discovery
12Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman Combining routing and traffic data for detection of IP forwarding anomalies. Search on Bibsonomy SIGMETRICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF routing, BGP, SNMP, traffic, network anomaly detection
12Robert T. Schweller, Ashish Gupta 0003, Elliot Parsons, Yan Chen 0004 Reversible sketches for efficient and accurate change detection over network data streams. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP mangling, data stream computation, modular hashing, reverse hashing, sketch, change detection, network anomaly detection
12Stephen D. Bay, Mark Schwabacher Mining distance-based outliers in near linear time with randomization and a simple pruning rule. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF diskbased algorithms, distance-based operations, anomaly detection, outliers
12Junshui Ma, Simon Perkins Online novelty detection on temporal sequences. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anomaly detection, online algorithm, support vector regression, novelty detection
12Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham Detection of injected, dynamically generated, and obfuscated malicious code. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection
12Eamonn J. Keogh, Stefano Lonardi, Bill Yuan-chi Chiu Finding surprising patterns in a time series database in linear time and space. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF feature extraction, anomaly detection, time series, Markov Model, suffix tree, novelty detection
12Andy J. Wellings, Bob Johnson, Bo Ingvar Sandén, Jörg Kienzle, Thomas Wolf 0013, Stephen Michell Integrating object-oriented programming and protected objects in Ada 95. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF concurrency, Ada 95, inheritance anomaly, concurrent object-oriented programming
12Thomas Lundqvist, Per Stenström Timing Anomalies in Dynamically Scheduled Microprocessors. Search on Bibsonomy RTSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF timing anomaly, Real-time systems, resource allocation, timing analysis, worst-case execution time, out-of-order execution, dynamically scheduled processor
12G. Manimaran, C. Siva Ram Murthy A Fault-Tolerant Dynamic Scheduling Algorithm for Multiprocessor Real-Time Systems and Its Analysis. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF resource reclaiming, run-time anomaly, fault tolerance, Real-time system, dynamic scheduling, safety critical application
12Stephan Reitzner Virtual synchronization: uncoupling synchronization annotations from synchronization code. Search on Bibsonomy SAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF synchronization, inheritance anomaly, concurrent object oriented programming
12Benjamin M. Brosgol A Comparison of the Concurrency Features of Ada 95 and Java. Search on Bibsonomy SIGAda The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Java, Java, Ada, Ada, concurrency, object-oriented programming, threads, tasking, inheritance anomaly
7Vladimir A. Golovko, Sergei V. Bezobrazov, Pavel Kachurka, Leanid U. Vaitsekhovich Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. Search on Bibsonomy Advances in Machine Learning II The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
7Dario Rossi 0001, Silvio Valenti Fine-grained traffic classification with netflow data. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SVM, traffic classification, netflow
7Jingbo Sun, Yue Wang 0007, Hongbo Si, Xia Mao, Jian Yuan, Xiuming Shan A PCA-based approach for exploring space-time structure of urban mobility dynamics. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF principal component analysis, urban computing, human mobility
7Aruna Jamdagni, Zhiyuan Tan 0001, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu Intrusion detection using GSAD model for HTTP traffic on web services. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF GSAD model, intrusion detection, attack, HTTP, payload
7Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, James Swee Chuan Tan Mass estimation and its applications. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mass estimation
7Lynda Thomas, Carol Zander, Anna Eckerdal Harnessing surprise: tales from students' transformational biographies. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF attitudinal factors, student biographies, work experience, transformation, threshold concepts, surprise
7Richard J. Enbody, William F. Punch Performance of python CS1 students in mid-level non-python CS courses. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cs1, curriculum, python, introduction to programming
7Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems. Search on Bibsonomy GPGPU The full citation details ... 2010 DBLP  DOI  BibTeX  RDF LOF, parallelization, GPU, intrusion detection system
7Kai Shen Request behavior variations. Search on Bibsonomy ASPLOS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF operating system adaptation, request modeling, server system, multicore, hardware counter
7George G. Cabral, Adriano L. I. Oliveira, Carlos B. G. Cahu Combining nearest neighbor data description and structural risk minimization for one-class classification. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nearest neighbor data description, Prototype reduction, Novelty detection, One-class classification, Structural risk minimization
7Xiao Zhi Gao 0001, Seppo J. Ovaska, Xiaolei Wang 0001, Mo-Yuen Chow Clonal optimization-based negative selection algorithm with applications in motor fault detection. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Search on Bibsonomy Comput. Sci. Res. Dev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Measurement requirements, Intrusion detection, Situation awareness, Network monitoring, Early warning systems
7Yi Xie 0002, Shun-Zheng Yu Monitoring the application-layer DDoS attacks for popular websites. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF popular Website, distributed denial of service (DDoS), application-layer
7Hichem Frigui, Paul D. Gader Detection and Discrimination of Land Mines in Ground-Penetrating Radar Based on Edge Histogram Descriptors and a Possibilistic K-Nearest Neighbor Classifier. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Songyun Duan, Shivnath Babu Automated Diagnosis of System Failures with Fa. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Songyun Duan, Shivnath Babu, Kamesh Munagala Fa: A System for Automating Failure Diagnosis. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7William Eberle, Lawrence B. Holder Mining for insider threats in business transactions and processes. Search on Bibsonomy CIDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Michelangelo Ceci, Annalisa Appice, Corrado Loglisci, Costantina Caruso, Fabio Fumarola, Donato Malerba Novelty Detection from Evolving Complex Data Streams with Time Windows. Search on Bibsonomy ISMIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Jeff Terrell, Kevin Jeffay, F. Donelson Smith, Jim Gogan, Joni Keller Passive, Streaming Inference of TCP Connection Structure for Network Server Management. Search on Bibsonomy TMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Ignasi Paredes-Oliva, Pere Barlet-Ros, Josep Solé-Pareta Portscan Detection with Sampled NetFlow. Search on Bibsonomy TMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Daniele Toscani, Marco Frigerio, Diego Bernini Dynamic update of data analysis models in emergency systems. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor data modelling, update strategies, model quality, model update
7Adnan Nadeem, Michael P. Howarth Adaptive intrusion detection & prevention of denial of service attacks in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection & prevention, ad-hoc network security
7Jiawei Huang 0001, Jianxin Wang 0001 An ECN-Based Congestion Control Algorithm for TCP Enhancement in WLAN. Search on Bibsonomy HPCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Fabian Hugelshofer, Paul Smith 0001, David Hutchison 0001, Nicholas J. P. Race OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance, intrusion detection, wireless mesh network, resource constrained devices
7Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Jin Heo, Tarek F. Abdelzaher AdaptGuard: guarding adaptive systems from instability. Search on Bibsonomy ICAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptation graphs, causality assumptions, adaptive systems
7R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aalst Abstractions in Process Mining: A Taxonomy of Patterns. Search on Bibsonomy BPM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Shengbo Chen Remote Sensing Based on Neural Networks Model for Hydrocarbon Potentials Evaluation in Northeast China. Search on Bibsonomy ISNN (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Songliao basin, Landsat TM, Hydrocarbon potentials, Self-organizing neural network
7T. Stephen Markham, Scott C. Evans, Jeremy Impson, Eric Steinbrecher Implementation of an Incremental MDL-Based Two Part Compression Algorithm for Model Inference. Search on Bibsonomy DCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Alexander O. Tarakanov Immunocomputing for Geoinformation Fusion and Forecast. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Geoinformation fusion, Spatiotemporal modeling, Forecast, Immunocomputing
7Yves Guiard The problem of consistency in the design of Fitts' law experiments: consider either target distance and width or movement form and scale. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF movement amplitude, movement difficulty, movement form, movement scale, movement shape, target distance, target tolerance, target width, methodology, theory, Fitts' law, experimental design
7Sakshi Babbar Integration of Domain Knowledge for Outlier Detection in High Dimensional Space. Search on Bibsonomy DASFAA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki Exploiting Temporal Persistence to Detect Covert Botnet Channels. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Jaeyong Chung, Henry J. Gardner Measuring temporal variation in presence during game playing. Search on Bibsonomy VRCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF breaks in presence, computer game, presence
7Gabriel Gómez Sena, Pablo Belzarena Early traffic classification using support vector machines. Search on Bibsonomy LANC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF support vector machines, traffic classification, traffic identification
7Jiadong Ren, Changzhen Hu, Kunsheng Wang, Di Wu 0033 A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets. Search on Bibsonomy AMT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Alexander W. Min, Kang G. Shin, Xin Hu 0001 Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Xinjie Lv, Xin Li 0002, Tian Yang, Zaifei Liao, Wei Liu 0023, Hongan Wang RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Cristina E. Manfredotti, Enza Messina Relational Dynamic Bayesian Networks to Improve Multi-target Tracking. Search on Bibsonomy ACIVS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano Detection of anomalous packet traffic via entropy. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Amar Kumar, Amiya Nayak, Alka Srivastava, Nita Goel Experimental validation of statistical algorithm for diagnosis of damage fault. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Lambert Spaanenburg, Mona Akbarniai Tehrani, Richard P. Kleihorst, Peter B. L. Meijer Behavior Modeling by Neural Networks. Search on Bibsonomy ICANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3-tier architecture, Sinai billiard system, collision avoidance, Behavioral modeling, convolutional neural network
7James M. Kang, Shashi Shekhar, Michael Henjum, Paige J. Novak, William A. Arnold Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach. Search on Bibsonomy SSTD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Jessica Lin 0001, Yuan Li Finding Structural Similarity in Time Series Data Using Bag-of-Patterns Representation. Search on Bibsonomy SSDBM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data mining, Time series, Similarity Search
7Payas Gupta, Chedy Raïssi, Gérard Dray, Pascal Poncelet, Johan Brissaud SS-IDS: Statistical Signature Based IDS. Search on Bibsonomy ICIW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
7Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web security, malicious software, distributed attacks
7Tarun Joshi, Anindo Mukherjee, Younghwan Yoo, Dharma P. Agrawal Airtime Fairness for IEEE 802.11 Multirate Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Max-Min, Packet Errors, Simulation, Fairness, Throughput, Analytical Model, Multi-rate, Contention Window
7Jimeng Sun 0001, Dacheng Tao, Spiros Papadimitriou, Philip S. Yu, Christos Faloutsos Incremental tensor analysis: Theory and applications. Search on Bibsonomy ACM Trans. Knowl. Discov. Data The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tensor, stream mining, multilinear algebra
7Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu Correlating burst events on streaming stock market data. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Burst detection, Indexing, Time-series, Correlation
7Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia Detecting VoIP Floods Using the Hellinger Distance. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network-level security and protection, Communication/Networking and Information Technology
7Brendan Tran Morris, Mohan M. Trivedi A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 16067 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license