Anomaly detection

Results: 503



#Item
411Immune system / Partition function / Anomaly detection / Process / Science / Computing / Management / Multi-agent systems / Intrusion detection system / Agent-based model

LNCS[removed]An Ecological Approach to Anomaly Detection: The EIA Model

Add to Reading List

Source URL: ccl.northwestern.edu

Language: English - Date: 2013-03-28 17:03:17
412Social media / Web 2.0 / Facebook / Real-time web / Spamming / Malware / Anomaly detection / Social networking service / Botnet / Software / Computing / World Wide Web

Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath MPI-SWS Krishna P. Gummadi MPI-SWS

Add to Reading List

Source URL: saikat.guha.cc

Language: English - Date: 2014-07-09 09:24:10
413Digital media / Websites / Cluster analysis / Geostatistics / Web content / Anomaly detection / Social networking service / Internet / Web page / Statistics / Data mining / Data analysis

Detection of Access to Terror-Related Web Sites Using an Advanced Terror Detection System (ATDS) Yuval Elovici Deutsche Telekom Laboratories at Ben-Gurion University, Department of Information Systems Engineering, Ben-Gu

Add to Reading List

Source URL: www.ise.bgu.ac.il

Language: English - Date: 2010-02-08 05:34:38
414Internet standards / Routing / Regional Internet Registries / Internet protocols / Resource Public Key Infrastructure / Border Gateway Protocol / Asia-Pacific Network Information Centre / Routing Policy Specification Language / AfriNIC / Internet / Network architecture / Computing

A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms Kotikapaludi Sriram Oliver Borchert Okhee Kim Patrick Gleichmann Doug Montgomery National Institute of Standards and Technology Gaithersburg, Mary

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2008-12-19 18:48:06
415Data security / Support vector machine / Pedestrian detection / Statistics / Anomaly detection / Data mining

PKU-IDM @ TRECVid 2010: Pair-Wise Event Detection in Surveillance Video b1 a*

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2013-07-22 11:52:14
416Anomaly detection / Data security / Cluster analysis / Outlier / Machine learning / Statistics / Data analysis / Data mining

National Aeronautics and Space Administration

Add to Reading List

Source URL: www.nasa.gov

Language: English - Date: 2014-08-18 19:09:19
417Kiri / Machine learning / Pulse / Dispersion / Science / Mathematical sciences / Education / Anomaly detection / Data mining / Data security

Machine Learning Methods for Astronomy Kiri Wagstaff, David Thompson, Umaa Rebbapragada Jet Propulsion Laboratory, California Institute of Technology Cost-sensitive Learning Cost: Computation? Time? Features?

Add to Reading List

Source URL: www.kiss.caltech.edu

Language: English - Date: 2011-06-23 18:39:04
418IOPS / Statistics / Anode / Anomaly detection / Latency / Engineering / Information technology management / Deployable Operations Group / Maritime Safety and Security Team / United States Coast Guard

Anode Empirical Detection of Performance Problems in Storage Systems Vipul Mathur, Cijo George, Jayanta Basak Advanced Technology Group, NetApp India

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:51:02
419Detection theory / Receiver operating characteristic / Socioeconomics / Statistical classification / Anomaly detection / Anomaly / Mean anomaly / Statistics / Data mining / Biostatistics

Anode: Empirical Detection of Performance Problems in Storage Systems using Time-Series Analysis of Periodic Measurements Vipul Mathur Cijo George

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:49:30
420Cyberwarfare / Hacker / Los Alamos National Laboratory / Netflow / Ethernet / Computing / Hacking / Computer programming

PathScan: Anomaly Detection Over Paths in a Graph

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-09-05 11:00:25
UPDATE