Anomaly detection

Results: 503



#Item
281Data analysis / Law enforcement / Criminology / Natural language processing / Statistical natural language processing / Link analysis / Crime analysis / Text mining / Anomaly detection / Statistics / Science / Data mining

RESEARCH FEATURE Crime Data Mining: A General Framework and Some Examples By increasing efficiency and reducing errors, crime data mining techniques

Add to Reading List

Source URL: www.business.hku.hk

Language: English - Date: 2004-08-04 18:46:46
282Computer network security / Computing / Cyberwarfare / Intrusion detection system / Anomaly detection / John Vincent Atanasoff / Whitelist / Computer security / Security / Data mining

COLLOQUIA LECTURE HARRIS LIN Thursday, April 16, 2015 3:40 p.m. 223 Atanasoff Hall

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2015-04-09 11:00:52
283Information retrieval / Outlier / Anomaly detection / Markup / Visualization / Science / Natural language processing / Statistics

Many Bills: Visualizing the Anatomy of Congressional Legislation

Add to Reading List

Source URL: clome.info

Language: English - Date: 2011-10-30 20:52:52
284Data analysis / Medical informatics / Anomaly detection / Data security / Cluster analysis / Disease management / Health care in the United States / Statistics / Data mining / Healthcare

Page 1 of 10 A Healthcare Utilization Analysis Framework for Hot Spotting and Contextual Anomaly Detection Jianying Hu, Ph.D., Fei Wang, Ph.D., Jimeng Sun, Ph.D. Robert Sorrentino, M.D., and Shahram Ebadollahi, Ph.D.

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2012-08-13 11:38:31
285Technology / Computer security / Wireless sensor network / Cyberwarfare / Data security / Anomaly detection / Intrusion detection system / Wireless ad-hoc network / Intrusion prevention system / Wireless networking / Computer network security / Computing

Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines

Add to Reading List

Source URL: titania.ctie.monash.edu.au

Language: English - Date: 2013-05-26 19:08:58
286Data mining / Data security / Anomaly / Outlier / Computer-aided audit tools / Data Analysis Techniques for Fraud Detection / Statistics / Data analysis / Anomaly detection

A modified version of this technical report will appear in ACM Computing Surveys, September[removed]Anomaly Detection : A Survey VARUN CHANDOLA University of Minnesota ARINDAM BANERJEE

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:29:06
287Data mining / Outlier / Statistical theory / Anomaly detection / RANSAC / Information retrieval / Kullback–Leibler divergence / Information theory / Statistics / Robust statistics / Data analysis

Detecting Outlier Sections in US Congressional Legislation Elif Aktolga Irene Ros, Yannick Assogba [removed]

Add to Reading List

Source URL: clome.info

Language: English - Date: 2011-10-30 20:52:52
288Missing data / Imputation / Randomized controlled trial / Outlier / Anomaly detection / Neural network / Statistics / Data analysis / Scientific method

Publications of the Laboratory of Data Analysis Data-analyysin laboratorion julkaisuja DataCleanAbstracts A conference for dealing with erroneous and missing data 29th - 31st May 2002, Jyv¨askyl¨a, Finland

Add to Reading List

Source URL: www.cs.york.ac.uk

Language: English - Date: 2003-06-16 07:11:22
289Artificial intelligence / Logic in computer science / Non-classical logic / Anomaly detection / Gvishiani / Fuzzy mathematics / Fuzzy set / Logic / Mathematical logic / Fuzzy logic

RUSSIAN JOURNAL OF EARTH SCIENCES, VOL. 10, ES1001, doi:2007ES000278, 2008 Recognition of anomalies from time series by fuzzy logic methods A. D. Gvishiani,1 S. M. Agayan,1 Sh. R. Bogoutdinov,1 E. M. Graeva,1 J.

Add to Reading List

Source URL: elpub.wdcb.ru

Language: English - Date: 2008-01-27 15:52:44
290Cyberwarfare / Computing / Anomaly detection / Data mining / Intrusion detection system / Misuse detection / Anomaly-based intrusion detection system / Bro / Intrusion detection system evasion techniques / Computer network security / Computer security / Data security

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2006-07-14 18:58:00
UPDATE