Anomaly detection

Results: 503



#Item
341Data analysis / Formal sciences / Anomaly detection / Data security / Local outlier factor / Cluster analysis / Anomaly / K-nearest neighbor algorithm / K-means clustering / Statistics / Data mining / Machine learning

A Comparative Evaluation of Anomaly Detection Algorithms for Maritime Video Surveillance Bryan Auslander1, Kalyan Moy Gupta1, and David W. Aha2 1 Knexus Research Corporation; Springfield, VA 22153

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-08-26 10:24:10
342Data security / Computer network security / Cyberwarfare / Port scanner / Nmap / Firewall / Anomaly detection / Transmission Control Protocol / Communications protocol / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA jyjung, awberge

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2006-09-21 21:38:54
343Data security / Anomaly detection / Robust statistics / Intrusion detection system / Outlier / Computer virus / Anomaly-based intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Data analysis

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
344Neural networks / Erol Gelenbe / Random neural network / Data security / Mobile telecommunications / Intrusion detection system / Malware / Network security / SMS / Technology / Mobile technology / Electronics

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-07-02 14:44:03
345Computer vision / Image processing / Anomaly detection / Data mining / Data security / Video tracking / Mixture model / Kadir–Brady saliency detector / Statistics / Artificial intelligence / Probability and statistics

Learning Object Motion Patterns for Anomaly Detection and Improved Object Detection Arslan Basharat, Alexei Gritai, and Mubarak Shah Computer Vision Lab, School of Electrical Engineering and Computer Science, University

Add to Reading List

Source URL: eecs.ucf.edu

Language: English - Date: 2008-08-28 14:07:30
346Mathematical physics / Multivariate statistics / Road transport / Singular value decomposition / Traffic flow / Inverse problem / Principal component analysis / Anomaly detection / Anomaly / Statistics / Mathematics / Transport

Network Anomography Yin Zhang Zihui Ge Albert Greenberg

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-08-10 01:59:54
347Information technology management / Computing / Anomaly detection / Data mining / Data modeling / Query string / Misuse detection / Database / Intrusion detection system / Data security / Database theory / Data management

ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2005-05-30 18:56:39
348Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
349Statistics / Theoretical computer science / Activity recognition / Cognition / Algorithm / Anomaly detection / Reactive planning / Hierarchical task network / Randomized algorithm / Artificial intelligence / Automated planning and scheduling / Applied mathematics

Maritime Threat Detection using Plan Recognition 1 2 Bryan Auslander1, Kalyan Moy Gupta1, & David W. Aha2

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-08-28 12:09:14
350Science / Data analysis / Anomaly detection / Reliability engineering / Log analysis / Statistics / Data mining / Systems engineering

NE W S NEC Inf orma tion RFID Fault Analysis Based on Data Mining Technology (WebSAM LogCollector TraceAssistant) Marketed

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:35:54
UPDATE