Anomaly detection

Results: 503



#Item
91

Product Datasheet I Grok Streaming Analytics I Breakthrough Streaming Analytics for Anomaly Detection

Add to Reading List

Source URL: grokstream.com

Language: English - Date: 2015-11-26 02:18:35
    92Statistics / Machine learning / Statistical classification / Data mining / Nonparametric statistics / Local outlier factor / Anomaly detection / Outlier / K-nearest neighbors algorithm / Naive Bayes classifier / Kernel density estimation / Supervised learning

    Classifier-Adjusted Density Estimation for Anomaly Detection and One-Class Classification Lisa Friedland∗ Amanda Gentzel∗

    Add to Reading List

    Source URL: people.cs.umass.edu

    Language: English - Date: 2014-02-13 14:01:13
    93

    BENSCH et al.: DEFORMABLE PROTOTYPES FOR MOTION ANOMALY DETECTION 1 Spatiotemporal Deformable Prototypes for Motion Anomaly Detection:

    Add to Reading List

    Source URL: lmb.informatik.uni-freiburg.de

    Language: English - Date: 2015-07-17 06:14:30
      94Data mining / Anomaly detection / Data security / Networks / Machine learning / Community structure / Supervised learning / Anomaly / Graph drawing / Local outlier factor / Shortest path problem / Outlier

      Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity Ted E. Senator, Henry G. David A.Bader, Edmond Chow, Thomas G. Dietterich, Alan Goldberg, Alex Memory, Irfan Essa, Joshua Jones,

      Add to Reading List

      Source URL: www.cc.gatech.edu

      Language: English - Date: 2013-06-03 22:19:16
      95Computing / Physics / Machine to machine / Anomaly detection / Domain Name System / Computer network / Anomaly / Entropy / Internet

      student21-schiavone_b.pdf

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2014-12-01 17:07:01
      96Outline of object recognition / Abnormality / Anomaly detection / Normality / Object Process Methodology / Object detection / Computer vision

      Detecting Strange Objects via Visual Attributes Babak Saleh ∗ ∗

      Add to Reading List

      Source URL: paul.rutgers.edu

      Language: English - Date: 2014-12-01 03:20:18
      97

      2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill

      Add to Reading List

      Source URL: flyer.sis.smu.edu.sg

      Language: English - Date: 2014-12-17 01:40:50
        98Computing / Data mining / Computer security / Information technology management / Anomaly detection / Data security / Intrusion detection system / Information technology / Anomaly / GridFTP / Transmission Control Protocol

        Anomaly Detection and Diagnosis in Grid Environments Lingyun Yang1 Chuang Liu2 1

        Add to Reading List

        Source URL: sc07.supercomputing.org

        Language: English - Date: 2007-10-05 15:33:58
        99

        Cyber-Critical Infrastructure Protection Using Real-time Payload-based Anomaly Detection * Patrick D¨ ussel1 , Christian Gehl1 , Pavel Laskov1,2 Jens-Uwe Bußer3 , Christof St¨ormann3 and Jan K¨

        Add to Reading List

        Source URL: www-rsec.cs.uni-tuebingen.de

        Language: English - Date: 2010-03-31 08:17:28
          100

          Anomaly detection to protect bank customers Stig H. Øksnes Business Unit Manager Fraud Prevention and Banking Services 24/7

          Add to Reading List

          Source URL: www.hig.no

          Language: English - Date: 2014-03-19 10:54:16
            UPDATE