Anomaly detection

Results: 503



#Item
431Software testing / Computer network security / Statistics / Data security / Intrusion detection system / Anomaly detection / Denial-of-service attack / Attack patterns / Vulnerability / Computer security / Hacking / Cyberwarfare

On Widening the Scope of Attack Recognition Languages Jon Doyle, Howard Shrobe, and Peter Szolovits Massachusetts Institute of Technology Cambridge, MA[removed]May 30, 2000

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 16:05:44
432Computer network security / System software / Netflow / SFlow / Botnet / Traffic flow / Denial-of-service attack / Anomaly detection / Network switch / Network management / Computing / Information technology management

Visible Intelligence SMARTFlow Flow-based Network and Security Monitoring Network Anomaly Detection

Add to Reading List

Source URL: www.solananetworks.com

Language: English - Date: 2014-03-07 00:17:01
433Maximum likelihood / Expectation–maximization algorithm / Anomaly detection / Likelihood function / Normal distribution / Anomaly / Latent Dirichlet allocation / Outlier / Poisson distribution / Statistics / Estimation theory / Mixture model

Hierarchical Probabilistic Models for Group Anomaly Detection Liang Xiong Machine Learning Department, Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2011-07-25 14:19:00
434Probability and statistics / Data mining / Programming paradigms / Anomaly detection / Data security / Supervised learning / Bayesian network / Mixture model / Attribute grammar / Statistics / Machine learning / Statistical models

Detecting Anomalous Records in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-06-26 14:42:17
435Data mining / Intrusion detection system / Anomaly / Recall / Denial-of-service attack / Mind / Computing / Information technology management / Computer network security / Data security / Anomaly detection

SECOND IEEE-SMC INFORMATION ASSURANCE WORKSHOP, WEST POINT, NEW YORK, JUNE 5-6, [removed]Event Recognition Beyond Signature and Anomaly Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-03-23 12:19:38
436Remote sensing / Science / Data mining / Data logger / Anomaly detection / Technology / Statistics / Cartography

Suelo: Human-assisted Sensing for Exploratory Soil Monitoring Studies Nithya Ramanathan Thomas Schoellhammer

Add to Reading List

Source URL: research.cens.ucla.edu

Language: English - Date: 2010-08-09 12:43:02
437Business / Continuous auditing / Audit / Financial audit / Internal audit / Materiality / Continuous monitoring / Statements on Auditing Standards / Computer-aided audit tools / Auditing / Accountancy / Risk

Continuity Equations In Continuous Auditing: The Models for Anomaly Detection

Add to Reading List

Source URL: raw.rutgers.edu

Language: English - Date: 2010-07-15 13:18:52
438Missing data / National Incident Based Reporting System / Sex offender registration / Imputation / Uniform Crime Reports / Data quality / Federal Bureau of Investigation / Anomaly detection / Outlier / Statistics / Data analysis / United States Department of Justice

WV_Testing the NIBRS Imputation Methods 2014_Final.indd

Add to Reading List

Source URL: www.jrsa.org

Language: English - Date: 2014-07-31 07:58:26
439Error detection and correction / DC Comics / Parallel computing / Supercomputers / WARP

EO-1 Anomaly Resolution Report for WARP Anomaly on[removed]

Add to Reading List

Source URL: eo1.gsfc.nasa.gov

Language: English - Date: 2005-02-23 14:14:59
440Data analysis / Data mining / Geostatistics / Traffic flow / Motion detection / Intelligent transportation system / Cluster analysis / Traffic congestion / Anomaly detection / Transport / Statistics / Road transport

Topographically-Based Real-Time Traffic Anomaly Detection in a Metropolitan Highway System∗ Rajmonda Sulo† Anushka Anand‡

Add to Reading List

Source URL: www.cs.uic.edu

Language: English - Date: 2010-02-27 00:59:51
UPDATE