<--- Back to Details
First PageDocument Content
Computer network security / Data analysis / Anomaly detection / Intrusion detection system / Local outlier factor / Network performance / Misuse detection / Robust random early detection / Outlier / Statistics / Data security / Data mining
Date: 2002-10-29 14:04:58
Computer network security
Data analysis
Anomaly detection
Intrusion detection system
Local outlier factor
Network performance
Misuse detection
Robust random early detection
Outlier
Statistics
Data security
Data mining

Add to Reading List

Source URL: www.csee.umbc.edu

Download Document from Source Website

File Size: 590,82 KB

Share Document on Facebook

Similar Documents

Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

DocID: 1xTRV - View Document

Machine learning / Artificial neural networks / Learning / Artificial intelligence / Applied mathematics / Unsupervised learning / Anomaly detection / Data mining / Data security / Anomaly / Autoencoder / Feature learning

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

DocID: 1xTRg - View Document

Technology / Information and communications technology / Computing / Machine learning / Anomaly detection / Data mining / Data security / Mobile telecommunications / Smartphone / Mobile phone / Anomaly

Anomaly detection based on real-time exploitation of billing systems

DocID: 1xTmR - View Document

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

DocID: 1vnK6 - View Document

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

DocID: 1vlla - View Document