Anomaly detection

Results: 503



#Item
231Anomaly detection / Data mining / Data security

“An Evaluation of Effect of Packet Sampling on Anomaly Detection Method” Takuya Motodate April 25, 2010 The 3rd CAIDA-WIDE-CASFI Joint Measurement Workshop @Osaka

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:21
232Cluster analysis / Multivariate statistics / K-means clustering / Outlier / Random forest / Anomaly detection / Medoid / K-medoids / Principal component analysis / Statistics / Data analysis / Data mining

R and Data Mining: Examples and Case Studies 1 Yanchang Zhao

Add to Reading List

Source URL: ftp.yz.yamagata-u.ac.jp

Language: English - Date: 2013-04-26 09:13:28
233Noise reduction / Data mining / Random forest / Image processing / Statistics / Anomaly detection

Data Min Knowl Disc DOIs10618Ensemble-based noise detection: noise ranking and visual performance evaluation Borut Sluban · Dragan Gamberger · Nada Lavraˇc

Add to Reading List

Source URL: www-ai.ijs.si

Language: English - Date: 2013-04-12 06:43:42
234Computational statistics / Learning / Anomaly detection / Data mining / Data security / Intrusion detection system / Concept learning / Boosting / Supervised learning / Machine learning / Statistics / Learning theory

To appear in Proceedings of the ACM Symposium on Information, Computer, and Communication Security, March 2006 Can Machine Learning Be Secure? Marco Barreno

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-02-11 16:41:05
235Data security / Pcap / Software / Data mining / Anomaly detection

Communicating the results of pcap data analysis through common metadata format Youki Kadobayashi NICT (National Inst of Comm Tech) / NAIST (Nara Inst of Sci & Tech) / WIDE

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:19
236Statistics / MAWI / Anomaly / Hough / Physics / Image processing / Computer vision / Hough transform

Evaluation of Anomaly Detection Method based on Pattern Recognition ● ●

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:52
237Anomaly detection / Data security / Statistical theory / Cluster analysis / Anomaly / Entropy / Denial-of-service attack / Traffic flow / Statistics / Data mining / Thermodynamic entropy

Mining Anomalies Using Traffic Feature Distributions Christophe Diot  Anukool Lakhina

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-20 07:38:53
238Information / Mutual information / Anomaly detection / Intrusion detection system / Function / Statistics / Information theory / Mathematics

Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
239Anomaly detection / Data security / IAPR / Statistics / Data mining / Machine learning

Microsoft Word - Kittler_Josef_110112.docx

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2012-10-31 11:11:20
240Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare

IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:40:14
UPDATE