Anomaly detection

Results: 503



#Item
131

Karriere bei Bosch Technik fürs Leben Abschlussarbeit: Mining time series data - anomaly detection Forschung,Voraus- und Technologieentwicklung

Add to Reading List

Source URL: www.statistik.tu-dortmund.de

Language: German - Date: 2014-08-19 05:32:24
    132

    Dynamic Network Evolution: Models, Clustering, Anomaly Detection Cemal Cagatay Bilgin and B¨ulent Yener Rensselaer Polytechnic Institute, Troy NY, 12180., Abstract— Traditionally, research on graph theory focused on s

    Add to Reading List

    Source URL: www.cs.rpi.edu

    Language: English - Date: 2009-07-31 13:36:02
      133Science / Artificial intelligence / Anomaly / HMM / Activity recognition / Statistics / Bioinformatics / Hidden Markov model

      PARTICLE-BASED TRACKING MODEL FOR AUTOMATIC ANOMALY DETECTION Erwan Jouneau and Cyril Carincotte Multitel asbl - 2 Rue Pierre et Marie CurieMons - Belgium ABSTRACT In this paper, we present a new method to automa

      Add to Reading List

      Source URL: www.multitel.be

      Language: English - Date: 2011-05-12 05:06:14
      134Anomaly detection / Data mining / Data security / World Wide Web / Traffic flow / Twitter / Anomaly / Physics / Road transport / Technology / Mathematical physics

      Mining Urban Traffic Events and Anomalies DM751 Abstract—As huge numbers of sensors relay real-time traffic measurements on city roads, real-time information management systems need to be in place that sieve relevant f

      Add to Reading List

      Source URL: researcher.watson.ibm.com

      Language: English - Date: 2015-01-16 23:37:55
      135Computer worms / Cyberwarfare / Warhol worm / Data security / Intrusion detection system / SQL Slammer / Snort / Botnet / Anomaly detection / Computer network security / System software / Software

      Stuart Staniford, PhD 812 Irish Settlement Rd, Freeville, NYoffice/fax (cell/voicemail)

      Add to Reading List

      Source URL: www.cs.cornell.edu

      Language: English
      136Law / Social engineering / Spamming / Tort law / Association of Certified Fraud Examiners / ReD / Phishing / Organized crime / Anomaly detection / Fraud / Ethics / Crimes

      Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by:

      Add to Reading List

      Source URL: theknowledgegroup.org

      Language: English - Date: 2015-05-29 02:07:38
      137Computer security / Network Behavior Anomaly Detection / Deep packet inspection / Netflow / Network intelligence / Application firewall / Packet capture / Firewall / Stateful firewall / Computer network security / Computing / Cyberwarfare

      White Paper DPI and Metadata for Cybersecurity Applications How vendors can improve solutions for new market demands by filling the gap between COTS

      Add to Reading List

      Source URL: www.qosmos.com

      Language: English - Date: 2015-03-31 11:08:00
      138Information / Teletraffic / Transmission Control Protocol / Network congestion / Packet loss / Measuring network throughput / Anomaly detection / Load balancing / Network performance / Computing / Information technology management

      Diagnosing Slow Web Page Access at the Client Side Tobias Flach, Ethan Katz-Bassett, and Ramesh Govindan Department of Computer Science University of Southern California ABSTRACT

      Add to Reading List

      Source URL: nsl.cs.usc.edu

      Language: English - Date: 2013-11-04 17:21:31
      139Graph / Bipartite graph / Adjacency matrix / Directed graph / Anomaly detection / Signed graph / Graph theory / Mathematics / Algebraic graph theory

      OddBall: Spotting Anomalies in Weighted Graphs Leman Akoglu Mary McGlohon Christos Faloutsos

      Add to Reading List

      Source URL: www.cs.cmu.edu

      Language: English - Date: 2010-02-28 14:32:30
      140Meteorology / Atmospheric sciences / Anomaly detection / Data security / NetCDF / Anomaly / Climatology / Statistics / Data mining / Data analysis

      Improving Oceanographic Anomaly Detection Using High Performance Computing Thomas Huang, Ed Armstrong, George Chang, Toshio Chin, Brian Wilson, Tong (Tony) Lee, Victor Zlotnicki. Jorge Vazquez and Michelle Gierach Jet Pr

      Add to Reading List

      Source URL: www.sccoos.org

      Language: English - Date: 2015-05-13 15:32:26
      UPDATE