Anomaly detection

Results: 503



#Item
461Anomaly detection / Data mining / Spatial analysis / Data set / Quartile / Principal component analysis / Regression analysis / Data quality / Plot / Statistics / Data analysis / Outlier

JUNE[removed]Detecting and Handling Anomalous Data in M4D Combined Report CONTENT

Add to Reading List

Source URL: www.espon.eu

Language: English - Date: 2013-04-07 06:16:39
462Fraud / Social engineering / Payment systems / Authentication / Notary / Credit card fraud / Anomaly detection / Risk-based authentication / Identity theft / Security / Cryptography / Access control

W H I T E PA P E R VeriSign® Identity Protection Fraud Detection Service An Overview

Add to Reading List

Source URL: www.complianceandprivacy.com

Language: English - Date: 2007-03-03 10:21:37
463Data / Denial-of-service attacks / Internet protocols / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Transmission Control Protocol / Internet protocol suite / Traffic flow / Computing / Computer network security / Internet

Design and Implementation of an Anomaly Detection System: an Empirical Approach Gaia Maselli Dipartimento di Informatica University of Pisa Via Buonarroti 2

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2008-12-17 19:32:02
464Software testing / Software bugs / Procedural programming languages / Daikon / Debugging / Invariant / Assertion / Type safety / Exception handling / Software engineering / Computing / Computer programming

Tracking Down Software Bugs Using Automatic Anomaly Detection Sudheendra Hangal Sun Microsystems India Pvt. Ltd. Divyasree Chambers, Shantinagar Bangalore[removed]

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2008-04-06 00:41:04
465Computing / Intrusion detection system / Intrusion prevention system / Alert correlation / Snort / Anomaly detection / ACARM-ng / Sguil / Computer network security / System software / Software

Network Intrusion Detection and Alert Correlation Xiaosong Lou and Ying Chen, {xlou, chen2}@usc.edu Stop Intrusion Before It Completes Collaborative Intrusion Detection with

Add to Reading List

Source URL: gridsec.usc.edu

Language: English - Date: 2005-08-30 20:28:11
466Software / Computer security / Data security / Intrusion detection system / System administration / AAFID / Anomaly detection / Snort / Misuse detection / Computer network security / Computing / System software

A Distributed Intrusion Detection Prototype using Security Agents V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris Network Management & Optimal Design Lab (NETMODE), ECE Department – National Technical

Add to Reading List

Source URL: www.netmode.ntua.gr

Language: English - Date: 2004-05-28 14:14:29
467Data security / Image processing / Change detection / Science / Fault detection and isolation / Segmentation / Pattern recognition / Video content analysis / Knowledge / Statistics / Anomaly detection / Data mining

Call for Papers Special Issue on: "Machine Learning and Pattern Recognition Models for Change

Add to Reading List

Source URL: www.djamel-bouchaffra.info

Language: English - Date: 2014-04-13 05:38:26
468Data / Association rule learning / Intrusion detection system / Anomaly detection / Computer-aided audit tools / Statistical classification / Communications protocol / Data mining / Statistics / Information

Mining Audit Data to Build Intrusion Detection Models∗ Wenke Lee and Salvatore J. Stolfo and Kui W. Mok Computer Science Department Columbia University 500 West 120th Street, New York, NY 10027 {wenke,sal,mok}@cs.colum

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
469Image processing / Computer vision / Cluster analysis / Geostatistics / ECognition / Synthetic aperture radar / Change detection / Segmentation / Anomaly detection / Statistics / Data mining / Machine learning

ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO 3297: 2007 Certified Organization)

Add to Reading List

Source URL: www.ijareeie.com

Language: English - Date: 2013-11-25 04:53:24
470Anomaly detection / Geographic information system / SCADA / Big data / ZigBee / Peer-to-peer / Sensor web / Sensor grid / Technology / Wireless networking / Wireless sensor network

Smart Cities Scalable Anomaly Detection for Smart City Infrastructure Networks Dynamically detecting anomalies can be difficult in very large-scale

Add to Reading List

Source URL: exascale.info

Language: English - Date: 2013-12-05 08:51:39
UPDATE