Anomaly detection

Results: 503



#Item
221Computer security / Data security / Intrusion detection systems / Snort / Anomaly detection / Network intrusion detection system / Intrusion prevention system / Alert correlation / Evasion / Computer network security / System software / Software

PDF Document

Add to Reading List

Source URL: romisatriawahono.net

Language: English - Date: 2013-01-23 01:11:11
222Markov models / Link analysis / PageRank / Search engine optimization / Normal distribution / Sampling / Google Search / Statistical hypothesis testing / Sample size determination / Statistics / Design of experiments / Hypothesis testing

Principled Sampling for Anomaly Detection Brendan Juba Washington University in St. Louis Abstract—Anomaly detection plays an important role in protecting computer systems from unforeseen attack b

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2014-12-05 16:34:02
223Statistics / MDMA / Anomaly / Aggregate / Information technology management / Anomaly detection / Data mining / Data security

Microsoft PowerPointENVISION_EnStreaM [Compatibility Mode]

Add to Reading List

Source URL: www.envision-project.eu

Language: English - Date: 2012-11-21 06:34:37
224Normal distribution / Poisson distribution / Outlier / F-test / Statistics / Poisson processes / Stochastic processes

An anomaly-based censorship-detection system for Tor George Danezis Tor Tech Report

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-07-25 04:40:02
225Spamming / Data mining / Data security / Data analysis / Anomaly detection / Intrusion detection system / Outlier / Anomaly / Politecnico di Milano / Statistics / Computer network security / Honeypot

Anomaly Detection and Honeypots: relationships, anyone? Stefano Zanero Politecnico di Milano Dipartimento di Elettronica e Informazione

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-05-20 05:15:16
226Information technology management / Data analysis / Machine learning / Wireless networking / Wireless sensor network / Geographic information system / Anomaly detection / Knowledge discovery / Complex event processing / Computing / Data mining / Statistics

Deliverable D4.5: Semantic data streams and stream ontologies software Date:

Add to Reading List

Source URL: www.envision-project.eu

Language: English - Date: 2012-11-15 03:45:26
227Cooperative Association for Internet Data Analysis / Information technology management / Anomaly detection / Data mining / Data security

Metadata format for benchmarking anomaly detection algorithms Youki Kadobayashi NICT / NAIST youki-k is.naist.jp

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:51
228Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

Add to Reading List

Source URL: www.21cfrpart11.com

Language: English - Date: 2004-02-27 15:21:35
229Formal sciences / Anomaly detection / Data mining / Data security / Analytics / Data analysis / Statistics / Business intelligence / Science

Minneapolis Intelligent Operations Platform (IOP) PTI Smart City and County Summit Otto Doll, City of Minneapolis CIO March 16, 2015

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
230Anomaly / MAWI / Anomaly detection / Data mining / Data security

Introduction Problem Proposed method

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:54
UPDATE