The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase anomaly detection (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1990 (16) 1991-1996 (16) 1997-1999 (20) 2000 (18) 2001-2002 (37) 2003 (60) 2004 (95) 2005 (133) 2006 (179) 2007 (200) 2008 (250) 2009 (239) 2010 (162) 2011 (202) 2012 (212) 2013 (240) 2014 (297) 2015 (331) 2016 (406) 2017 (491) 2018 (633) 2019 (125)
Publication types (Num. hits)
article(1422) book(3) incollection(43) inproceedings(2845) phdthesis(48) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(309) IGARSS(44) ICC(40) RAID(38) ICDM(35) KDD(35) GLOBECOM(31) IEEE Access(31) ICASSP(30) ICIP(29) IJCNN(28) Expert Syst. Appl.(27) IEEE Trans. Geoscience and Rem...(27) BigData(26) Sensors(26) FUSION(23) More (+10 of total 1452)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1368 occurrences of 584 keywords

Results
Found 4362 publication records. Showing 4362 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
92Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang Is sampled data sufficient for anomaly detection? Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF portscan, volume anomaly, anomaly detection, sampling
92Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 Anomaly Detection in Computer Security and an Application to File System Accesses. Search on Bibsonomy ISMIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection
92Yao Li 0002, Zhitang Li, Li Wang 0015 Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. Search on Bibsonomy ICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
89Kalle Burbeck, Simin Nadjm-Tehrani ADWICE - Anomaly Detection with Real-Time Incremental Clustering. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Clustering, Adaptability, Real-time, Intrusion Detection, Anomaly Detection
82Caleb C. Noble, Diane J. Cook Graph-based anomaly detection. Search on Bibsonomy KDD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF data mining, anomaly detection, graph regularity
82R. Sekar, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou Specification-based anomaly detection: a new approach for detecting network intrusions. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, network monitoring
82Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina Impact of packet sampling on anomaly detection metrics. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, sampling, network traffic analysis
81Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck Incorporation of Application Layer Protocol Syntax into Anomaly Detection. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly Detection, Web Security, Protocol Analysis
78Kymie M. C. Tan, Roy A. Maxion The Effects of Algorithmic Diversity on Anomaly Detector Performance. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
78Yasser Yasami, M. Farahmand, V. Zargari An ARP-based Anomaly Detection Algorithm Using Hidden Markov Model in Enterprise Networks. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Address Resolution Protocol (ARP), Hidden Markov Model (HMM), Anomaly Detection
77Cheng-Fa Tsai, Chia-Chen Yen Unsupervised Anomaly Detection Using HDG-Clustering Algorithm. Search on Bibsonomy ICONIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unsupervised anomaly detection, data mining, intrusion detection, anomaly detection, data clustering
76Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida An approach to spacecraft anomaly detection problem using kernel feature space. Search on Bibsonomy KDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF kernel feature space, spacecraft, von Mises Fisher distribution, principal component analysis, anomaly detection, time series data
75João B. D. Cabrera, Lundy M. Lewis, Raman K. Mehra Detection and Classification of Intrusions and Faults using Sequences of System Calls. Search on Bibsonomy SIGMOD Record The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
75Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel Anomalous system call detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian network, anomaly detection, computer security
74Quan Qian, Mingjun Xin Research on Hidden Markov Model for System Call Anomaly Detection. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host System Calls, Hidden Markov Model, Anomaly Detection
74Adrian Spalka, Jan Lehnhardt A Comprehensive Approach to Anomaly Detection in Relational Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF relational databases, anomaly detection, Database security, misuse detection
74Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Temporal Characteristics, Principal Component Analysis, Anomaly Detection
73Yongsu Park, Jaeheung Lee, Yookun Cho Intrusion Detection Using Noisy Training Data. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, intrusion detection, anomaly detection, system call
73Roy A. Maxion, Kymie M. C. Tan Benchmarking Anomaly-Based Detection Systems. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF intrusion detection, benchmarking, Anomaly detection, computer security, empirical methods
72Marc Dacier, O. Sami Saydjari Special Seminar: Intrusion Detection. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
71L. Lawrence Ho, Christopher J. Macey, Ronald Hiller A Distributed and Reliable Platform for Adaptive Anomaly Detection in IP Networks. Search on Bibsonomy DSOM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
71Stefan Skludarek, Hirosuke Yamamoto Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data. Search on Bibsonomy ADMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unsupervised Anomaly Detection, Anomaly Detection, Time Series Analysis, Masquerade Detection, Training Data
70George Nychis, Vyas Sekar, David G. Andersen, Hyong Kim, Hui Zhang 0001 An empirical evaluation of entropy-based traffic anomaly detection. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF entropy, anomaly detection
70Takeshi Okamoto, Yoshiteru Ishida Framework of an Immunity-Based Anomaly Detection System for User Behavior. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Immunity-based system, Hidden Markov model, Anomaly detection, Computer security, ROC
70Carrie Gates, Carol Taylor Challenging the anomaly detection paradigm: a provocative discussion. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, intrusion detection
69Xue Wang, Daowei Bi, Liang Ding, Sheng Wang Bootstrap Gaussian Process classifiers for rotating machinery anomaly detection. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Varun Chandola, Arindam Banerjee, Vipin Kumar Anomaly detection: A survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Anomaly detection, outlier detection
68Augustin Soule, Fernando Silveira, Haakon Ringberg, Christophe Diot Challenging the supremacy of traffic matrices in anomaly detection. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF traffic aggregation, anomaly detection
68Zheng Qin, Na Li, Dafang Zhang, Nai-Zheng Bian Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain
68Roy A. Maxion, Kymie M. C. Tan Anomaly Detection in Embedded Systems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dependability, anomaly detection, coverage, Anomaly
68Lionel Fillatre, Igor V. Nikiforov Non-Bayesian Detection and Detectability of Anomalies From a Few Noisy Tomographic Projections. Search on Bibsonomy IEEE Trans. Signal Processing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Shashank Shanbhag, Tilman Wolf Massively Parallel Anomaly Detection in Online Network Measurement. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen Network anomaly detection based on TCM-KNN algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCM-KNN algorithm, machine learning, network security, anomaly detection
66Tao Xiang, Shaogang Gong Video Behavior Profiling for Anomaly Detection. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Behaviour profiling, Dynamic Scene Modelling, FeatureSelection, Anomaly Detection, Dynamic Bayesian Networks, Spectral clustering
66Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou Network anomaly detection and classification via opportunistic sampling. Search on Bibsonomy IEEE Network The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
65Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan Using artificial anomalies to detect unknown and known network intrusions. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Artificial anomaly, Security, Intrusion detection, Anomaly detection
65Jiong Zhang, Mohammad Zulkernine, Anwar Haque Random-Forests-Based Network Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Systems, Man, and Cybernetics, Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Detection, Principal Component Analysis, Vector Quantization, Multivariate Data Analysis
64Marcus Chang, Andreas Terzis, Philippe Bonnet Mote-Based Online Anomaly Detection Using Echo State Networks. Search on Bibsonomy DCOSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Real-time, Anomaly detection
64Xiaoshu Hang, Honghua Dai Applying both positive and negative selection to supervised learning for anomaly detection. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF positive selection, anomaly detection, artificial immune system, supervised learning, negative selection
64Ye Wang, Hussein M. Abdel-Wahab A Multilayer Approach of Anomaly Detection for Email Systems. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
63Jiong Zhang, Mohammad Zulkernine A Hybrid Network Intrusion Detection Technique Using Random Forests. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid detection, Data mining, Intrusion detection, Network security, Random forests
63Roberto Perdisci, Guofei Gu, Wenke Lee Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
63Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). Search on Bibsonomy ISPAN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Principal component analysis, Anomaly detection, Wireless mesh networks
63Huijuan Lu, Jianguo Chen, Wei Wei Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian networks, Anomaly detection
62Yang Li 0002, Li Guo 0001 TCM-KNN scheme for network anomaly detection using feature-based optimizations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight
62John Zachary, John C. McEachen, Daniel W. Ettlich Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection
60Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, concept drift, model update
60Pedro Casas, Lionel Fillatre, Sandrine Vaton, Igor V. Nikiforov Volume Anomaly Detection in Data Networks: An Optimal Detection Algorithm vs. the PCA Approach. Search on Bibsonomy FITraMEn The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network Monitoring and Traffic Analysis, Optimal Volume Anomaly Detection, Network Traffic Modeling
60Bill Lin, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Performance Evaluation Review The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Performance Evaluation Review The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Performance Evaluation Review The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Performance Evaluation Review The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero Selecting and Improving System Call Models for Anomaly Detection. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF System Call Models, Self Organizing Map, Anomaly Detection, Stochastic Models, Deterministic Models
60Hwa-Ju Lee, Kyung-Sook Lee, Ihn-Han Bae A weighted-dissimilarity-based anomaly detection method for mobile networks. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, mobile wireless networks, dissimilarity
60Oliver Obst, X. Rosalind Wang, Mikhail Prokopenko Using Echo State Networks for Anomaly Detection in Underground Coal Mines. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coal mines, sensor networks, bayesian networks, anomaly detection, recurrent neural networks, echo state networks
60Prahlad Fogla, Wenke Lee Evading network anomaly detection systems: formal reasoning and practical techniques. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF polymorphic blending attack, anomaly detection, mimicry attack
60Dan Li 0002, Kefei Wang, Jitender S. Deogun FADS: A Fuzzy Anomaly Detection System. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, anomaly detection, Fuzzy theory
60Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix
60Kalle Burbeck Current Research and Use of Anomaly Detection. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
59Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka Conditional Anomaly Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data mining, mining methods and algorithms
58Jinfu Wang, John Bigham Anomaly detection in the case of message oriented middleware. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, message oriented middleware, self-protection
58Kenneth L. Ingham, Anil Somayaji A methodology for designing accurate anomaly detection systems. Search on Bibsonomy LANC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web server security, intrusion detection, anomaly detection, HTTP
58George K. Baah, Alexander G. Gray, Mary Jean Harrold On-line anomaly detection of deployed software: a statistical machine learning approach. Search on Bibsonomy SOQUA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly diagnosis, machine learning, anomaly detection, Markov models, fault localization
58Shrijit S. Joshi, Vir V. Phoha Investigating hidden Markov models capabilities in anomaly detection. Search on Bibsonomy ACM Southeast Regional Conference (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anomaly detection system, hidden Markov models
58Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Gray-box extraction of execution graphs for anomaly detection. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call monitor, intrusion detection, anomaly detection, control flow graph
58Fabio A. González, Dipankar Dasgupta Anomaly Detection Using Real-Valued Negative Selection. Search on Bibsonomy Genetic Programming and Evolvable Machines The full citation details ... 2003 DBLP  DOI  BibTeX  RDF matching rule, self-organizing maps, anomaly detection, artificial immune systems, negative selection
58Albert J. Höglund, Kimmo Hätönen, Antti S. Sorvari A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. Search on Bibsonomy IJCNN (5) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Self-Organizing Map (SOM), anomaly detection, novelty detection, host-based intrusion detection
58Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Shashank Shanbhag, Tilman Wolf Accurate anomaly detection through parallelism. Search on Bibsonomy IEEE Network The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Gaurav Tandon, Philip K. Chan, Debasis Mitra 0003 MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anomaly detection, data cleaning, motifs
56Pedro Henriques dos Santos Teixeira, Ruy Luiz Milidiú Data stream anomaly detection through principal subspace tracking. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data streams, anomaly detection, time series, dimensionality reduction, unsupervised learning
55Kymie M. C. Tan, Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detector coverage, minimal foreign sequence, stide, performance evaluation, Anomaly detection
55Christoph C. Michael Finding the Vocabulary of Program Behavior Data for Anomaly Detection. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina Detection and identification of network anomalies using sketch subspaces. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defeat, anomaly detection, sketch, subspace method
54Christopher Krügel, Giovanni Vigna Anomaly detection of web-based attacks. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF world-wide web, network security, anomaly detection
54L. Lawrence Ho, Symeon Papavassiliou Network and Service Anomaly Detection in Multi-Service Transaction-Based Electronic Commerce Wide Area Networks. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF proactive network management, network/service anomaly detection, electronic commerce networks
53Martin Rehák, Michal Pechoucek, Martin Grill, Karel Bartos Trust-Based Classifier Combination for Network Anomaly Detection. Search on Bibsonomy CIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Mário Antunes 0002, Manuel Eduardo Correia TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection. Search on Bibsonomy IWPACBB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tunable activation threshold, anomaly detection, artificial immune system, network intrusion detection
52Min Qin, Kai Hwang 0001 Frequent Episode Rules for Internet Anomaly Detection. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traffic datamining, Grid computing, intrusion detection, Network security, anomaly detection, false alarms
52Na Luo, Fuyu Yuan, Wanli Zuo, Fengling He, Zhiguo Zhou Improved Unsupervised Anomaly Detection Algorithm. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Hongli Luo, Mei-Ling Shyu Provision of Quality of Service with Router Support. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Ji Zhang, Qigang Gao, Hai H. Wang Anomaly detection in high-dimensional network data streams: A case study. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Sang Hyun Oh, Won Suk Lee Anomaly Intrusion Detection Based on Dynamic Cluster Updating. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Mining, Clustering, Intrusion Detection, Anomaly Detection
51Carla Marceau, Matthew Stillerman Modular Behavior Profiles in Systems with Shared Libraries (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dynamic link libraries, intrusion detection, Anomaly detection, shared libraries, behavior profile
51Eric Totel, Frédéric Majorczyk, Ludovic Mé COTS Diversity Based Intrusion Detection and Application to Web Servers. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COTS diversity, Intrusion detection, anomaly detection, design diversity
51Sang-Jun Han, Sung-Bae Cho Combining Multiple Host-Based Detectors Using Decision Tree. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combining detectors, decision tree, anomaly detection
51Mark Last, Bracha Shapira, Yuval Elovici, Omer Zaafrany, Abraham Kandel Content-Based Methodology for Anomaly Detection on the Web. Search on Bibsonomy AWIC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF information retrieval, user modeling, anomaly detection, web security, activity monitoring, unsupervised clustering
50Marius Kloft, Ulf Brefeld, Patrick Düssel, Christian Gehl, Pavel Laskov Automatic feature selection for anomaly detection. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine learning, feature selection, intrusion detection, network security, anomaly detection, multiple kernel learning, support vector data description
50Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura A Hybrid Command Sequence Model for Anomaly Detection. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Command sequence, User model, Anomaly detection, Computer security, IDS, GA
50Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry Immune anomaly detection enhanced with evolutionary paradigms. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF artificial immune systems, coevolution, network anomaly detection
50Xinguang Peng, Kaifeng Ren Anomaly Detection with High Deviations for System Security. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privileged programs, Anomaly detection, System security
50Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella Distributed Spatial Anomaly Detection. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Kalle Burbeck, Simin Nadjm-Tehrani Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Yongmin Tan, Xiaohui Gu, Haixun Wang Adaptive system anomaly prediction for large-scale hosting infrastructures. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF anomaly prediction, context-aware prediction model
50Kai Shen, Christopher Stewart, Chuanpeng Li, Xin Li Reference-driven performance anomaly identification. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF operating system, performance anomaly
50Ashish Kamra, Elisa Bertino, Rimma V. Nehme Responding to Anomalous Database Requests. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Yao Li 0002, Zhitang Li, Shuyu Liu A Fuzzy Anomaly Detection Algorithm for IPv6. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fuzzy detection, genetic algorithm, negative selection
49Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie Towards Incorporating Discrete-Event Systems in Secure Software Development. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anomaly detection, Software security, discrete-event systems, finite-state automata
Displaying result #1 - #100 of 4362 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license