Anomaly detection

Results: 503



#Item
491Machine learning / Artificial neural network / Anomaly detection / Unsupervised learning / Recurrent neural network / Long short term memory / Data mining / Feedforward neural network / Self-organizing map / Neural networks / Statistics / Cybernetics

PDF Document

Add to Reading List

Source URL: etd.uwc.ac.za

Language: English - Date: 2007-03-16 06:25:14
492Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Network performance / Local outlier factor / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

PDF Document

Add to Reading List

Source URL: www.siam.org

Language: English - Date: 2008-05-13 10:17:41
493Computer network security / System software / Netflow / SFlow / Botnet / Traffic flow / Denial-of-service attack / Anomaly detection / Network switch / Network management / Computing / Information technology management

PDF Document

Add to Reading List

Source URL: www.solananetworks.com

Language: English - Date: 2012-07-05 14:40:41
494Computer security / WAN optimization / Deep packet capture / NetScout Systems /  Inc. / Cisco Systems / Netwitness / Cyberwarfare / Network Behavior Anomaly Detection / Riverbed Technology / Deep packet inspection / Computing / Computer network security

PDF Document

Add to Reading List

Source URL: www.lancope.com

Language: English - Date: 2011-05-13 03:00:00
495Statistical theory / Multivariate statistics / Outlier / Regression analysis / Anomaly detection / Mahalanobis distance / Principal component analysis / Errors and residuals in statistics / Data mining / Statistics / Data analysis / Robust statistics

PDF Document

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2009-07-05 18:07:51
496Malware / Intrusion detection system / Anomaly detection / Smartphone / Network security / Computer virus / Computing / Information technology management / Security / Antivirus software / Data security / Data mining

PDF Document

Add to Reading List

Source URL: www.dai-labor.de

Language: English - Date: 2009-11-02 05:19:46
497Anomaly detection / Data security / Anomaly / Outlier / Computer-aided audit tools / Intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data analysis / Data mining

PDF Document

Add to Reading List

Source URL: www.cs.umn.edu

Language: English - Date: 2008-10-16 10:32:33
498Computer network security / Data analysis / Anomaly detection / Intrusion detection system / Local outlier factor / Network performance / Misuse detection / Robust random early detection / Outlier / Statistics / Data security / Data mining

PDF Document

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2002-10-29 14:04:58
499Multivariate statistics / Robust statistics / Statistical theory / Local outlier factor / Outlier / Anomaly detection / ELKI / Mahalanobis distance / Errors and residuals in statistics / Statistics / Data mining / Data analysis

PDF Document

Add to Reading List

Source URL: siam.omnibooksonline.com

Language: English - Date: 2011-05-02 11:40:17
500Robust statistics / Anomaly detection / Data security / Outlier / Hans-Peter Kriegel / Cluster analysis / Database / Local outlier factor / Statistics / Data analysis / Data mining

PDF Document

Add to Reading List

Source URL: www.dbs.ifi.lmu.de

Language: English - Date: 2009-05-13 08:52:04
UPDATE