Anomaly detection

Results: 503



#Item
311Relational database management systems / Oracle Data Mining / Oracle Corporation / Oracle Database / Oracle Big Data Appliance / Predictive analytics / Microsoft SQL Server / RMAN / Insert / Data management / Software / Computing

Fraud and Anomaly Detection Using Oracle Advanced Analytic Option 12c Charlie Berger Sr. Director Product Management, Data Mining and Advanced Analytics

Add to Reading List

Source URL: www.oracle.com

Language: English
312Anomaly detection / Data mining / Data security / Dynamics / Voronoi diagram / Mobile phone / Time capture / Telephone call / Technology / Electronic engineering / Electronics

Uncovering individual and collective human dynamics from mobile phone records

Add to Reading List

Source URL: www.barabasilab.com

Language: English - Date: 2008-05-22 14:35:49
313Robust statistics / Local outlier factor / Anomaly detection / Outlier / Cluster analysis / BIRCH / Robust regression / K-medoids / K-means clustering / Statistics / Data mining / Data analysis

CURIO : A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets∗ Aaron Ceglar, John F. Roddick and David M.W. Powers School of Informatics and Engineering, Flinders University, PO Box 2100, Adelaide,

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:28:41
314Cross-platform software / Relational database management systems / Statistics / Database management systems / Oracle Data Mining / Anomaly detection / Intrusion detection system / Misuse detection / Oracle RAC / Software / Data security / Computing

Microsoft Word - CamposMilenovaICDM05_8pages.doc

Add to Reading List

Source URL: www.oracle.com

Language: English
315Computer network security / Science / Statistics / Data analysis / Data mining / Analysis / Threat / Mass spectrometry software / Anomaly detection / Computer security / Data security / Security

2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:14
316Alarms / Data analysis / Anomaly / Control chart / Alarm devices / Unix signal / Standard deviation / Carnegie Mellon University / Statistics / Quality / Change detection

Microsoft PowerPoint - time_series_methods

Add to Reading List

Source URL: www.autonlab.org

Language: English - Date: 2008-07-07 16:16:26
317Data security / Business / Enron / Statistics / Data mining / Anomaly detection

Paragon Science, Inc. Evolving Enron Email Network • Paragon Science, Inc.

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:27
318Computer security / Data mining / Malware / Anomaly detection / Real-time protection / Threat / Computer network security / Security / Cyberwarfare

iBoss logo_dark green+subline

Add to Reading List

Source URL: residential.iphantom.com

Language: English - Date: 2015-03-24 12:47:41
319Cyberwarfare / Threat / Federal Bureau of Investigation / Industrial espionage / Cyber Insider Threat / Anomaly Detection at Multiple Scales / Computer network security / Computer security / Security

FEDERAL BUREAU OF INVESTIGATION “Fidelity, Bravery, and Integrity” Combating the Insider Threat at the FBI: Real World Lessons Learned Patrick Reidy

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 04:36:09
320Anomaly detection / Outlier / Wafer testing / Waardenburg syndrome / Statistics / Data analysis / Semiconductor device fabrication

Leveraging Test Data for Quality Michael Schuldenfrei, CTO GSA Quality Team Meeting December, 2014

Add to Reading List

Source URL: www.gsaglobal.org

Language: English - Date: 2014-12-15 16:33:09
UPDATE