Anomaly detection

Results: 503



#Item
251Technology / ProCurve Products / ProCurve / SFlow / Network switch / RMON / HP Networking Products / Network Behavior Anomaly Detection / Network management / Computing / Information technology management

ProCurve Networking by HP Traffic Management for the Enterprise Introduction ............................................................................................................... 2

Add to Reading List

Source URL: www.hp.com

Language: English - Date: 2008-04-30 18:54:17
252Data security / Computer network security / Cyberwarfare / Firewall / Port scanner / Nmap / Communications protocol / Transmission Control Protocol / Anomaly detection / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA {jyjung, awberg

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-05-13 23:18:43
253Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
254Data analysis / Regression analysis / Spatial data analysis / Kriging / Anomaly detection / Outlier / Spatial analysis / Robust regression / Data mining / Statistics / Robust statistics / Geostatistics

Microsoft Word - APRdocx

Add to Reading List

Source URL: www.atmospolres.com

Language: English - Date: 2015-04-15 15:36:18
255Cyberwarfare / Data security / Computer network security / Security / Computing / Intrusion detection system evasion techniques / Anomaly detection / Intrusion detection system / Computer security / Synthetic data

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-25 01:06:21
256Search algorithms / Data mining / Estimation theory / K-nearest neighbor algorithm / Algorithm / Outlier / Nearest neighbor search / Randomized algorithm / Anomaly detection / Statistics / Data analysis / Statistical inference

On the Power of Randomization in Big Data Analytics Phạm Đăng Ninh Theoretical Computer Science Section IT University of Copenhagen, Denmark

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2014-10-16 14:19:55
257Robust statistics / Outlier / Anomaly detection / Variance / Statistics / Data analysis / Data mining

Microsoft PowerPoint - Slide 2.pptx

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2012-09-19 08:46:39
258Anomaly detection / Data mining / Data security / Programming Language Design and Implementation / Anomaly / Amazon Kindle / Adalbert Ricken / Programming language / Java / Computing / Software / Computer programming

MATHIAS RICKEN EXPERIENCE

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2015-05-02 11:06:23
259Data mining / Data analysis / Outlier / Econometrics / James River spinymussel / Pleurobema / Renin / Regression analysis / Anomaly detection / Statistics / Unionidae / Robust statistics

Department of Mathematics and Statistics Colloquia Student Research Presentations (Monday, April 20 at 3:45 pm in Roop 103, refreshments at 3:30) Title: Statistical Modeling of James Spinymussel (Pleurobema collina): A

Add to Reading List

Source URL: educ.jmu.edu

Language: English - Date: 2015-04-13 17:52:51
260Markov processes / Dynamical systems / Combinatorics on words / Symbolic dynamics / Markov chain / Hidden Markov model / Finite-state machine / Stochastic matrix / Stochastic process / Statistics / Markov models / Probability and statistics

Signal Processing – 1130 www.elsevier.com/locate/sigpro Symbolic dynamic analysis of complex systems for anomaly detection

Add to Reading List

Source URL: www.mne.psu.edu

Language: English - Date: 2008-08-22 12:28:34
UPDATE