Anomaly detection

Results: 503



#Item
301National security / Computer security / Public safety / Data mining / Information security / Insider / Anomaly detection / International Multilateral Partnership Against Cyber Threats / RMIT University / Security / Data security / Crime prevention

I NDUS TRY DO CTORAL T RAI NI NG C E NTRE IN MATHEMATICS & STATISTICS

Add to Reading List

Source URL: www.atn.edu.au

Language: English - Date: 2015-03-20 00:09:45
302Statistical tests / Constructible universe / Anomaly detection / Maximum likelihood / Likelihood-ratio test / Likelihood function / Ordinal number / Statistics / Statistical theory / Estimation theory

Journal of Machine Learning Research[removed]1561 Submitted 4/12; Revised 1/13; Published 6/13 Fast Generalized Subset Scan for Anomalous Pattern Detection Edward McFowland III

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2013-07-20 22:05:55
303Computer security / Intrusion detection system / Snort / Network intrusion detection system / Anomaly detection / Martin Roesch / Sourcefire Vulnerability Research Team / Sourcefire / Computer network security / System software / Software

DOC Document

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-23 16:21:20
304Data mining / Anomaly detection / Intrusion detection system / AAFID / Feature selection / Feature / Data Analysis Techniques for Fraud Detection / Statistics / Computer security / Data security

The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-02-05 20:56:16
305Data mining / Geochemistry / Geophysics / Mineral exploration / Outlier / Anomaly detection / Plot / Cluster analysis / Box plot / Statistics / Data analysis / Multivariate statistics

IDENTIFYING GEOCHEMICAL ANOMALIES

Add to Reading List

Source URL: crcleme.org.au

Language: English - Date: 2009-04-06 13:08:00
306Data mining / Geochemistry / Geophysics / Mineral exploration / Outlier / Anomaly detection / Plot / Cluster analysis / Box plot / Statistics / Data analysis / Multivariate statistics

IDENTIFYING GEOCHEMICAL ANOMALIES

Add to Reading List

Source URL: crcleme.org.au

Language: English - Date: 2009-01-14 01:20:43
307Computer network security / Data security / Anomaly detection / Intrusion detection system / Cluster analysis / Peer-to-peer / Traffic classification / Network security / SFlow / Statistics / Data mining / Data analysis

3-2 D  ata Mining over Network Streams BAN Tao and KADOBAYASHI Youki Network monitoring and analyzing systems (NMASes) have been playing an active roll for preventing cyber attacks and providing practical and proactive

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:05:58
308Multivariate statistics / Data mining / Data visualization / Information technology governance / Visualization / Multidimensional scaling / Grid plan / Anomaly detection / Statistics / Science / Data analysis

Exploring Large Scale Time-series Data Using Nested Timelines Zaixian Xiea and Matthew O. Wardb and Elke A. Rundensteiner b a Oracle b

Add to Reading List

Source URL: davis.wpi.edu

Language: English - Date: 2012-07-23 22:10:09
309Data mining / Technology / Hyperspectral imaging / Infrared imaging / Remote sensing / Spectroscopy / Wireless sensor network / Anomaly detection / Science / Statistics / Surveillance

   VIP Mobile, Inc. Lead Investigator: Dr David Pokrajac

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:27
310Data mining / Univariate / Statistics / Data security / Anomaly detection

Microsoft PowerPoint - amia-2003-v13

Add to Reading List

Source URL: www.autonlab.org

Language: English - Date: 2008-07-07 16:16:28
UPDATE