Anomaly detection

Results: 503



#Item
471Phishing / Spamming / Internet / Anti-phishing software / Netcraft / Internet Identity / Website / Computing / Crime / Social engineering / Computer crimes / Computer network security

Anomaly Based Web Phishing Page Detection Ying Pan, Xuhua Ding School of Information Systems, Singapore Management University {ypan,xhding}@smu.edu.sg Abstract

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2006-12-01 05:21:56
472Computing / Computer security / System software / McAfee VirusScan / Network security / Firewall / Deep packet inspection / Network Behavior Anomaly Detection / Host Based Security System / Antivirus software / McAfee / Computer network security

Technology Blueprint Look Inside Network Traffic Eliminate administrative and security blind spots

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:53
473Fraud / Social engineering / Payment systems / Authentication / Notary / Credit card fraud / Anomaly detection / Risk-based authentication / Identity theft / Security / Cryptography / Access control

W H I T E PA P E R VeriSign® Identity Protection Fraud Detection Service An Overview

Add to Reading List

Source URL: complianceandprivacy.com

Language: English - Date: 2007-03-03 10:21:37
474Cell biology / Statistics / Neurite / Anomaly detection / Adipocyte / Anomaly / Edge detection / Feature / Hough transform / Computer vision / Image processing / Biology

DISTRIBUTED ONLINE ANOMALY DETECTION IN HIGH-CONTENT SCREENING Adam Goode† , Rahul Sukthankar‡ , Lily Mummert‡ , Mei Chen‡ , Jeffrey Saltzman• , David Ross• , Stacey Szymanski• , Anil Tarachandani• , M. S

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-05-28 12:27:26
475Supervised learning / Outlier / Anomaly detection / Bioinformatics / Unsupervised learning / Computer vision / Image retrieval / Cluster analysis / Classification in machine learning / Statistics / Machine learning / Statistical classification

Kernel methods & sparse methods for computer vision Francis Bach

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-07-25 01:47:33
476Networks / Algebraic graph theory / Graph partition / Community structure / Bipartite graph / Adjacency matrix / Tanner graph / Graph theory / Mathematics / Theoretical computer science

Neighborhood Formation and Anomaly Detection in Bipartite Graphs Jimeng Sun1 Huiming Qu2 Deepayan Chakrabarti3∗ Christos Faloutsos1† 1 Carnegie Mellon Univ. {jimeng, christos}@cs.cmu.edu

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-09-23 18:16:33
477Computer security / Intrusion detection system / Information Assurance Technology Analysis Center / Network intrusion detection system / Intrusion prevention system / Snort / Host-based intrusion detection system / Anomaly detection / Sourcefire / Computer network security / System software / Software

Tools Information Assurance Tools Report Sixth Edition

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2009-12-28 13:31:36
478Cluster analysis / Machine learning / Robust statistics / Outlier / Anomaly detection / Consensus clustering / Mixture model / Ensemble learning / Statistical ensemble / Statistics / Data analysis / Data mining

Ensembles for Unsupervised Outlier Detection: Challenges and Research Questions [Position Paper] Arthur Zimek Ricardo J. G. B. Campello

Add to Reading List

Source URL: www.sigkdd.org

Language: English - Date: 2014-01-31 16:18:34
479Outlier / Data mining / Anomaly detection / Cytokine / Plot / Box plot / Statistics / Robust statistics / Data analysis

Outlier Detection through Bipartite Visual Analytics Suresh K. Bhavnani1 PhD, Justin A. Drake1 BS, Bryant Dang1 BS, Shyam Vishweswaran2, MD PhD

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
480Data mining / Outlier / Ceteris paribus / Similarity / Anomaly detection / Univariate / Statistics / Data analysis / Robust statistics

Outlier detection vs. similarity analysis László PITLIK, 2012. I. Introduction

Add to Reading List

Source URL: miau.gau.hu

Language: English - Date: 2012-02-05 10:05:36
UPDATE