Anomaly detection

Results: 503



#Item
241System software / Buffer overflow / SIGSEGV / Sandbox / Anomaly detection / Segmentation fault / Computing / Software bugs / Computer errors

End-Point Counter-Worm Mechanism Using Automated Software Patching Angelos Keromytis Columbia University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-10-09 02:05:17
242Computing / Malware / Cryptographic nonce / Bluetooth / Computer network / Electronic engineering / Computer network security / Wireless security / Extensible Authentication Protocol / Technology / Mobile computers / Mobile device management

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
243Anomaly detection / Data mining / Data security / Analytics / Business / Statistics / Business intelligence / Formal sciences

Minneapolis Intelligent Operations Platform Mission Control Focus Manage Event Horizon Normal Planned Events

Add to Reading List

Source URL: www.lcc.leg.mn

Language: English - Date: 2014-07-23 15:54:14
244Robust statistics / Outlier / Cluster analysis / Anomaly detection / Statistics / Data mining / Data analysis

doi:comjnl/bxq074

Add to Reading List

Source URL: www-ai.ijs.si

Language: English - Date: 2013-03-25 05:40:58
245Module theory / Syzygy / Anomaly detection / Anomaly / Intrusion detection system / Type I and type II errors / Statistics / Data mining / Spam filtering

Community Epidemic Detection using Time-Correlated Anomalies Adam J. Oliner, Ashutosh V. Kulkarni, and Alex Aiken Stanford University� {oliner, ashutosh.kulkarni, aiken}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-09-07 15:35:08
246Mathematical analysis / Computational geometry / Convex hull / Outlier / Convex set / Quartile / Anomaly detection / Statistics / Convex analysis / Convex geometry

Data Quality ALA-ERIN Collaboration Simon Bennett ALA / ERIN DSEWPAC, 14 OctThe Atlas is funded by the Australian Government under the National Collaborative Research Infrastructure Strategy

Add to Reading List

Source URL: www.ala.org.au

Language: English - Date: 2012-01-17 23:15:50
247Data management / Machine learning / Association rule learning / Anomaly detection / Cluster analysis / Algorithm / Artificial neural network / Outlier / Data set / Statistics / Data mining / Data analysis

Detecting Anomalous Longitudinal Associations through Higher Order Mining∗ Liang Ping and John F. Roddick School of Computer Science, Engineering and Mathematics, Flinders University, PO Box 2100, Adelaide,

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:28:42
248Software testing / Control flow / Daikon / Object-oriented programming / Software bug / Invariant / Assertion / Exception handling / Debugging / Software engineering / Computing / Computer programming

Tracking Down Software Bugs Using Automatic Anomaly Detection Sudheendra Hangal Monica S. Lam

Add to Reading List

Source URL: www-suif.stanford.edu

Language: English - Date: 2002-02-03 04:03:46
249Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
250Data mining / Geochemistry / Geophysics / Mineral exploration / Outlier / Anomaly detection / Plot / Cluster analysis / Box plot / Statistics / Data analysis / Multivariate statistics

IDENTIFYING GEOCHEMICAL ANOMALIES

Add to Reading List

Source URL: www.crcleme.org.au

Language: English - Date: 2009-01-14 01:20:43
UPDATE