Anomaly detection

Results: 503



#Item
111

A Protocol Graph Based Anomaly Detection System Michael Collins April 28, 2008 School of Electrical and Computer Engineering

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2008-05-11 15:51:25
    112Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software

    A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

    Add to Reading List

    Source URL: www.gatsby.ucl.ac.uk

    Language: English - Date: 2006-10-19 19:27:44
    113Internet / Anomaly detection / Data mining / Data security / Computer security / Malware / Botnet / Domain Name System / Anomaly / Computer network security / Computing / Spamming

    ThetaRay_Logo_Options_Draft7

    Add to Reading List

    Source URL: www.thetaray.com

    Language: English - Date: 2014-12-06 20:02:21
    114Information technology management / Computing / Anomaly detection / Data security / Scalability / Neural network / Statistics / Computational neuroscience / Data mining

    Simularity Brings Real Time Deep Learning To The Edges Of The Internet Of Things Deep Learning For The Connected World Predict events and detect anomalies in real time, using deep distributed learning, on massive time s

    Add to Reading List

    Source URL: simularity.com

    Language: English - Date: 2015-03-20 01:37:38
    115SCADA / Data mining / Hacking / Anomaly detection / DNP3 / Stuxnet / Malware / Cyberwarfare / Network Behavior Anomaly Detection / Technology / Telemetry / Industrial automation

    Industrial_Diagram_Draft4

    Add to Reading List

    Source URL: www.thetaray.com

    Language: English - Date: 2014-12-06 20:00:27
    116Antivirus software / Android / Embedded Linux / Cloud clients / Technology / Malware / Android Market / Computer virus / Tablet computer / Smartphones / Computing / Software

    Instance-based Anomaly Method for Android Malware Detection Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero,Carlos Laorden, Javier Nieves and Pablo G. Bringas S3Lab, University of Deusto, Avenida de las Universidades 24,

    Add to Reading List

    Source URL: paginaspersonales.deusto.es

    Language: English - Date: 2013-09-03 04:36:48
    117Electronic warfare / Military technology / Industrial automation / SCADA / Telemetry / Cyberwarfare / Anomaly detection / Malware / Statistics / Technology / Security / Hacking

    ThetaRay_Logo_Options_Draft7

    Add to Reading List

    Source URL: www.thetaray.com

    Language: English - Date: 2014-12-06 19:30:09
    118Cluster analysis / Multivariate statistics / K-means clustering / Outlier / Random forest / Anomaly detection / Medoid / K-medoids / Principal component analysis / Statistics / Data analysis / Data mining

    R and Data Mining: Examples and Case Studies 1 Yanchang Zhao

    Add to Reading List

    Source URL: ftp.cixug.es

    Language: English - Date: 2013-04-26 09:13:28
    119

    Taint-Enhanced Anomaly Detection? Lorenzo Cavallaro1 and R. Sekar2 1 Department of Computer Science, Vrije Universiteit Amsterdam, The Netherlands 2

    Add to Reading List

    Source URL: seclab.cs.sunysb.edu

    - Date: 2014-07-10 01:53:28
      120

      AUTOMATIC SCENE ACTIVITY MODELLING AND ANOMALY DETECTION IN VIDEO FOOTAGE VANAHEIM - FP7-ICTGrant Agreement OUTLINES

      Add to Reading List

      Source URL: www.multitel.be

      - Date: 2011-07-05 07:58:32
        UPDATE