Anomaly detection

Results: 503



#Item
261Cluster analysis / Multivariate statistics / K-means clustering / Outlier / Random forest / Anomaly detection / Medoid / K-medoids / Principal component analysis / Statistics / Data analysis / Data mining

R and Data Mining: Examples and Case Studies 1 Yanchang Zhao

Add to Reading List

Source URL: ftp.yzu.edu.tw

Language: English - Date: 2013-04-26 09:13:28
262Anomaly detection / Data mining / Data security / Programming Language Design and Implementation / Anomaly / Amazon Kindle / Adalbert Ricken / Programming language / Java / Computing / Software / Computer programming

DOC Document

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2015-05-02 11:06:22
263Crime prevention / Data mining / Information security / National security / Statistics / Anomaly detection / Public safety / Data security / Security / Computer security

PRESS RELEASE TIER-3 TO SPONSOR IISP SECURITY SEMINAR IN LONDON London, October 11, 2013: Tier-3, the enterprise security software company that pioneered Behaviour Anomaly Detection, announced today that it will sponsor

Add to Reading List

Source URL: www.tier-3.com

Language: English - Date: 2015-01-14 19:37:56
264Data mining / Geochemistry / Geophysics / Mineral exploration / Outlier / Anomaly detection / Plot / Cluster analysis / Box plot / Statistics / Data analysis / Multivariate statistics

IDENTIFYING GEOCHEMICAL ANOMALIES

Add to Reading List

Source URL: www.crcleme.org.au

Language: English - Date: 2009-04-06 13:08:00
265Computer vision / Anomaly detection / Intrusion detection system / Misuse detection / Synthetic data / Feature / Receiver operating characteristic / Statistics / Data security / Data mining

Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-08-08 19:37:58
266Neural networks / Anomaly detection / Data mining / Data security / Independent component analysis / Wireless sensor network / Artificial neuron / Statistics / Statistical models / Signal processing

A Fresh Perspective: Learning to Sparsify for Detection in Massive Noisy Sensor Networks Matthew Faulkner Annie H. Liu

Add to Reading List

Source URL: las.ethz.ch

Language: English - Date: 2013-02-26 07:29:48
267Data security / Conditional random field / Local outlier factor / Normal distribution / Support vector machine / Correlation and dependence / Statistics / Data mining / Anomaly detection

To appear, International Joint Conference on Artificial Intelligence (IJCAIOne-Class Conditional Random Fields for Sequential Anomaly Detection Yale Song1 , Zhen Wen2 , Ching-Yung Lin2 , Randall Davis1 MIT Compu

Add to Reading List

Source URL: labs.yahoo.com

Language: English - Date: 2015-01-28 16:09:52
268Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
269Computational statistics / Artificial intelligence / Cybernetics / Learning / Anomaly detection / Statistical classification / Data Analysis Techniques for Fraud Detection / Machine learning / Statistics / Data mining

III : Large : Discovering Complex Anomalous Patterns Many of the most interesting and valuable discoveries from data arise not from the evaluation of single records, but from identifying a set of records that are anomalo

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2009-08-18 15:22:57
270Cyberwarfare / Data security / Intrusion detection system / Anomaly detection / Vulnerability / AAFID / Intrusion prevention system / Computer network security / Security / Computer security

Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2002-09-10 02:20:42
UPDATE