Anomaly detection

Results: 503



#Item
481Data analysis / Machine learning / Predictive analytics / Data stream mining / Anomaly detection / Neural network / Cluster analysis / Book:Machine Learning - The Complete Guide / Statistics / Data mining / Business intelligence

T HE 18 TH E UROPEAN C ONFERENCE ON M ACHINE L EARNING THE 11 TH

Add to Reading List

Source URL: www.ecmlpkdd2007.org

Language: English - Date: 2007-08-30 09:09:00
482Data security / Computer network security / Anomaly detection / Machine learning / N-gram / Intrusion detection system / Cluster analysis / Metasploit Project / Statistics / Data mining / Computer security

Journal in Computer Virology manuscript No. (will be inserted by the editor)

Add to Reading List

Source URL: eprints.pascal-network.org

Language: English - Date: 2006-11-22 07:08:15
483Computing / Alert correlation / Data mining / Intrusion detection system / Anomaly detection / Snort / ACARM-ng / Computer network security / Software / System software

Managing Alerts in a Multi-Intrusion Detection Environment Frédéric Cuppens ONERA Toulouse

Add to Reading List

Source URL: www.acsa-admin.org

Language: English - Date: 2001-10-15 21:28:12
484Computer network security / Information technology management / Intrusion detection system / Anomaly detection / Wireless intrusion prevention system / Misuse detection / Intrusion detection system evasion techniques / Intrusion prevention system / Data security / Computer security / Security

ISSN:[removed]Dr Guruprasad Khataniar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), [removed]

Add to Reading List

Source URL: ijcscn.com

Language: English - Date: 2012-08-28 09:07:11
485Cybernetics / Anomaly detection / Novelty detection / Artificial neural network / Artificial neuron / Self-organizing map / Perceptron / Transfer function / Neural networks / Statistics / Machine learning

Novelty Detection in Learning Systems Stephen Marsland † † Division of Imaging Science and Biomedical Engineering,

Add to Reading List

Source URL: seat.massey.ac.nz

Language: English - Date: 2008-06-29 17:09:40
486Data mining / Outlier / Statistical theory / Anomaly detection / Novelty detection / Quartile / Plot / Errors and residuals in statistics / Mahalanobis distance / Statistics / Data analysis / Robust statistics

White Rose Consortium ePrints Repository http://eprints.whiterose.ac.uk/

Add to Reading List

Source URL: eprints.whiterose.ac.uk

Language: English - Date: 2013-02-07 07:18:31
487Information technology management / Statistics / Intrusion detection system / Anomaly detection / Audit trail / Information technology security audit / Audit / Association rule learning / Vulnerability / Data mining / Security / Auditing

Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns Stephen C-Y Lu

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:42:02
488Data security / Sendmail / Computer network security / Syslog / Daemon / Anomaly detection / Intrusion detection system / Artificial immune system / Email forwarding / Computing / Information technology management / System software

A Sense of Self for Unix Processes Stephanie Forrest Steven A. Hofmeyr

Add to Reading List

Source URL: webpages.math.luc.edu

Language: English - Date: 2008-06-17 14:44:54
489OPTICS algorithm / Multivariate statistics / Local outlier factor / Cluster analysis / Outlier / Anomaly detection / DBSCAN / Hans-Peter Kriegel / Reachability / Statistics / Data mining / Data analysis

Proceedings of the 3rd European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD’99), Prague, September 1999.

Add to Reading List

Source URL: www.dbs.ifi.lmu.de

Language: English - Date: 1999-10-05 04:08:52
490Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Local outlier factor / Network performance / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection† Aleksandar Lazarevic*, Levent Ertoz*, Vipin Kumar*, Aysel Ozgur*, Jaideep Srivastava* Abstract

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2003-03-21 18:36:29
UPDATE