Anomaly detection

Results: 503



#Item
271Data mining / Outlier / Robust regression / Anomaly detection / Imputation / Data set / Statistics / Robust statistics / Data analysis

EUREDIT WorkpackageDevelop & evaluate new methods for statistical outlier detection & outlier robust multivariate imputation The workpackages WP4.2 and WP5.2 of Euredit have been merged into one workpackage WP4/5.

Add to Reading List

Source URL: www.cs.york.ac.uk

Language: English - Date: 2004-03-08 09:57:52
272Data security / Data analysis / Intrusion detection system / Anomaly / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Anomaly detection

Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-10-22 16:33:27
273Computer network security / AAFID / Intrusion detection system / Data security / Petri net / Unified Communist Party of Nepal / Snort / Anomaly detection / CPN Tools / Software / Computer security / System software

The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-06-01 02:53:24
274Psychometrics / Scale / Data quality / Anomaly detection / Scaling / Structure / Mathematics / Information / Science / Data mining / Market research

Microsoft Word - PHZ_RWGK_PDA_CCP4_Winter_2005.doc

Add to Reading List

Source URL: www.ccp4.ac.uk

Language: English - Date: 2005-12-15 06:06:54
275Transmission Control Protocol / Anomaly detection / Data mining / Data security

Securely explore your data CYBERSECURITY THREAT DETECTION Deriving Insights with Sqrrl and Spark GraphX Adam Fuchs, CTO

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-31 13:01:51
276Data mining / Wireless networking / Wireless sensor network / Bayesian network / Conditional random field / Causality / Markov chain / Anomaly detection / Statistics / Graphical models / Networks

Spatio-Temporal Event Detection Using Dynamic Conditional Random Fields

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2009-07-14 20:11:06
277Web services / Cloud infrastructure / Infrastructure as a Service / Grok / Amazon Elastic Compute Cloud / Amazon Web Services / Anomaly detection / Amazon.com / Cloud computing / Computing / Centralized computing

Product Datasheet I Grok for IT Analytics I Breakthrough Science for IT Anomaly Detection  

Add to Reading List

Source URL: numenta.com

Language: English - Date: 2015-02-05 00:48:41
278Data mining / Bioinformatics / Hidden Markov model / Data security / Anomaly detection / Mixture model / Outlier / Linear regression / Statistics / Data analysis / Markov models

d:Documentspapersormal detectionparison.eps

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2009-04-29 23:19:42
279Computer security / Data mining / Malware / Anomaly detection / Real-time protection / Threat / Computer network security / Security / Cyberwarfare

iBoss logo_dark green+subline

Add to Reading List

Source URL: www.iboss.com

Language: English - Date: 2015-03-06 12:47:40
280Statistics / Computer security / Data mining / Denial-of-service attack / Genetic programming / Anomaly detection / Anomaly-based intrusion detection system / Computer network security / Intrusion detection system / Cyberwarfare

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2006-12-26 09:46:58
UPDATE