|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Jianning Mai, Chen-Nee Chuah, Ashwin Sridharan, Tao Ye, Hui Zang |
Is sampled data sufficient for anomaly detection? |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
portscan, volume anomaly, anomaly detection, sampling |
69 | Paolo Bellavista, Antonio Corradi, Luca Foschini 0001 |
Dynamic and context-aware streaming adaptation to smooth quality degradation due to IEEE 802.11 performance anomaly. |
J. Supercomput. |
2008 |
DBLP DOI BibTeX RDF |
Streaming adaptation, IEEE 802.11 anomaly, Wireless networks, Middleware, Service management |
65 | João B. D. Cabrera, Lundy M. Lewis, Raman K. Mehra |
Detection and Classification of Intrusions and Faults using Sequences of System Calls. |
SIGMOD Rec. |
2001 |
DBLP DOI BibTeX RDF |
|
65 | Yao Li 0002, Zhitang Li, Li Wang 0015 |
Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. |
ICIC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Kymie M. C. Tan, Roy A. Maxion |
The Effects of Algorithmic Diversity on Anomaly Detector Performance. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Yongmin Tan, Xiaohui Gu, Haixun Wang |
Adaptive system anomaly prediction for large-scale hosting infrastructures. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
anomaly prediction, context-aware prediction model |
62 | Kai Shen, Christopher Stewart, Chuanpeng Li, Xin Li |
Reference-driven performance anomaly identification. |
SIGMETRICS/Performance |
2009 |
DBLP DOI BibTeX RDF |
operating system, performance anomaly |
62 | Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina |
Impact of packet sampling on anomaly detection metrics. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, sampling, network traffic analysis |
62 | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 |
Anomaly Detection in Computer Security and an Application to File System Accesses. |
ISMIS |
2005 |
DBLP DOI BibTeX RDF |
Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection |
59 | Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos, Maurizio Molina, Pere Barlet-Ros, Daniela Brauckhoff |
Automating root-cause analysis of network anomalies using frequent itemset mining. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
anomaly extraction, anomaly validation, association rules |
59 | Roy A. Maxion, Kymie M. C. Tan |
Anomaly Detection in Embedded Systems. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
dependability, anomaly detection, coverage, Anomaly |
58 | Lionel Fillatre, Igor V. Nikiforov |
Non-Bayesian Detection and Detectability of Anomalies From a Few Noisy Tomographic Projections. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Xiaohui Gu, Haixun Wang |
Online Anomaly Prediction for Robust Cluster Systems. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Karim Tabia, Salem Benferhat, Yassine Djouadi |
A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel |
Anomalous system call detection. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian network, anomaly detection, computer security |
55 | Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo |
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, concept drift, model update |
55 | Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian |
Anomaly extraction in backbone networks using association rules. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
anomaly extraction, histogram cloning, association rules |
55 | Yasser Yasami, Majid Farahmand, Vahid Zargari |
An ARP-based Anomaly Detection Algorithm Using Hidden Markov Model in Enterprise Networks. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
Address Resolution Protocol (ARP), Hidden Markov Model (HMM), Anomaly Detection |
55 | Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun |
Traffic Anomaly Detection and Characterization in the Tunisian National University Network. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
Temporal Characteristics, Principal Component Analysis, Anomaly Detection |
55 | Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida |
An approach to spacecraft anomaly detection problem using kernel feature space. |
KDD |
2005 |
DBLP DOI BibTeX RDF |
kernel feature space, spacecraft, von Mises Fisher distribution, principal component analysis, anomaly detection, time series data |
55 | Kalle Burbeck, Simin Nadjm-Tehrani |
ADWICE - Anomaly Detection with Real-Time Incremental Clustering. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Clustering, Adaptability, Real-time, Intrusion Detection, Anomaly Detection |
55 | Caleb C. Noble, Diane J. Cook |
Graph-based anomaly detection. |
KDD |
2003 |
DBLP DOI BibTeX RDF |
data mining, anomaly detection, graph regularity |
55 | R. Sekar 0001, Ajay Gupta 0002, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou |
Specification-based anomaly detection: a new approach for detecting network intrusions. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, network monitoring |
55 | Roy A. Maxion, Kymie M. C. Tan |
Benchmarking Anomaly-Based Detection Systems. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
intrusion detection, benchmarking, Anomaly detection, computer security, empirical methods |
52 | Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan |
Using artificial anomalies to detect unknown and known network intrusions. |
Knowl. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Artificial anomaly, Security, Intrusion detection, Anomaly detection |
52 | Daniela Brauckhoff, Martin May, Bernhard Plattner |
Comparison of anomaly signal quality in common detection metrics. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
anomaly exposure measure, signal comparison, anomaly detection |
52 | Cheng-Fa Tsai, Chia-Chen Yen |
Unsupervised Anomaly Detection Using HDG-Clustering Algorithm. |
ICONIP (2) |
2007 |
DBLP DOI BibTeX RDF |
unsupervised anomaly detection, data mining, intrusion detection, anomaly detection, data clustering |
52 | George K. Baah, Alexander G. Gray, Mary Jean Harrold |
On-line anomaly detection of deployed software: a statistical machine learning approach. |
SOQUA |
2006 |
DBLP DOI BibTeX RDF |
anomaly diagnosis, machine learning, anomaly detection, Markov models, fault localization |
52 | Kymie M. C. Tan, Roy A. Maxion |
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
anomaly detector coverage, minimal foreign sequence, stide, performance evaluation, Anomaly detection |
50 | Shashank Shanbhag, Tilman Wolf |
Massively Parallel Anomaly Detection in Online Network Measurement. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Xue Wang 0001, Daowei Bi, Liang Ding, Sheng Wang 0010 |
Bootstrap Gaussian Process classifiers for rotating machinery anomaly detection. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Roberto Perdisci, Guofei Gu, Wenke Lee |
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
50 | L. Lawrence Ho, Christopher J. Macey, Ronald Hiller |
A Distributed and Reliable Platform for Adaptive Anomaly Detection in IP Networks. |
DSOM |
1999 |
DBLP DOI BibTeX RDF |
|
48 | Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors |
Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). |
ISPAN |
2008 |
DBLP DOI BibTeX RDF |
Principal component analysis, Anomaly detection, Wireless mesh networks |
48 | Yongsu Park, Jaeheung Lee, Yookun Cho |
Intrusion Detection Using Noisy Training Data. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
security, intrusion detection, anomaly detection, system call |
47 | Varun Chandola, Arindam Banerjee 0001, Vipin Kumar 0001 |
Anomaly detection: A survey. |
ACM Comput. Surv. |
2009 |
DBLP DOI BibTeX RDF |
Anomaly detection, outlier detection |
47 | Peng Li 0059, Debin Gao, Michael K. Reiter |
Automatically Adapting a Trained Anomaly Detector to Software Patches. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
software patches, system-call monitoring, binary difference analysis, Anomaly detection |
47 | Tao Xiang 0002, Shaogang Gong |
Video Behavior Profiling for Anomaly Detection. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2008 |
DBLP DOI BibTeX RDF |
Behaviour profiling, Dynamic Scene Modelling, FeatureSelection, Anomaly Detection, Dynamic Bayesian Networks, Spectral clustering |
47 | Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck |
Incorporation of Application Layer Protocol Syntax into Anomaly Detection. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Anomaly Detection, Web Security, Protocol Analysis |
47 | George Nychis, Vyas Sekar, David G. Andersen, Hyong Kim, Hui Zhang 0001 |
An empirical evaluation of entropy-based traffic anomaly detection. |
Internet Measurement Conference |
2008 |
DBLP DOI BibTeX RDF |
entropy, anomaly detection |
47 | Arnur G. Tokhtabayev, Victor A. Skormin |
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Anomaly Propagation, Intrusion detection, Markov Models |
47 | Takeshi Okamoto, Yoshiteru Ishida |
Framework of an Immunity-Based Anomaly Detection System for User Behavior. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
Immunity-based system, Hidden Markov model, Anomaly detection, Computer security, ROC |
47 | Quan Qian, Mingjun Xin |
Research on Hidden Markov Model for System Call Anomaly Detection. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Host System Calls, Hidden Markov Model, Anomaly Detection |
47 | Augustin Soule, Fernando Silveira, Haakon Ringberg, Christophe Diot |
Challenging the supremacy of traffic matrices in anomaly detection. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
traffic aggregation, anomaly detection |
47 | Adrian Spalka, Jan Lehnhardt |
A Comprehensive Approach to Anomaly Detection in Relational Databases. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
relational databases, anomaly detection, Database security, misuse detection |
47 | Xiaoshu Hang, Honghua Dai 0001 |
Applying both positive and negative selection to supervised learning for anomaly detection. |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
positive selection, anomaly detection, artificial immune system, supervised learning, negative selection |
47 | Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian |
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain |
45 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Mining anomalies using traffic feature distributions. |
SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
anomaly classification, network-wide traffic analysis, anomaly detection |
45 | Stefan Skludarek, Hirosuke Yamamoto |
Anomaly Detection Using Time Index Differences of Identical Symbols with and without Training Data. |
ADMA |
2009 |
DBLP DOI BibTeX RDF |
Unsupervised Anomaly Detection, Anomaly Detection, Time Series Analysis, Masquerade Detection, Training Data |
45 | Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro |
NADA - Network Anomaly Detection Algorithm. |
DSOM |
2007 |
DBLP DOI BibTeX RDF |
Traffic Anomaly Identification, Anomaly Signature |
43 | Dmitry G. Korzun, Andrei V. Gurtov |
A local equilibrium model for P2P resource ranking. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao |
A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Sipat Triukose, Zhihua Wen, Michael Rabinovich |
Content delivery networks: how big is big enough? |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Alma Riska, Erik Riedel |
Evaluation of disk-level workloads at different time scales. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Ashish Kamra, Elisa Bertino, Rimma V. Nehme |
Responding to Anomalous Database Requests. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Hongli Luo, Mei-Ling Shyu |
Provision of Quality of Service with Router Support. |
ISM |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Shashank Shanbhag, Tilman Wolf |
Accurate anomaly detection through parallelism. |
IEEE Netw. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou |
Network anomaly detection and classification via opportunistic sampling. |
IEEE Netw. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka |
Conditional Anomaly Detection. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
Data mining, mining methods and algorithms |
43 | Paolo Bellavista, Antonio Corradi, Luca Foschini 0001 |
Context-Aware Multimedia Middleware Solutions for Counteracting IEEE 802.11 Performance Anomaly. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Ye Wang, Hussein M. Abdel-Wahab |
A Multilayer Approach of Anomaly Detection for Email Systems. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Carrie Gates, Carol Taylor |
Challenging the anomaly detection paradigm: a provocative discussion. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
security, intrusion detection |
43 | Christoph C. Michael |
Finding the Vocabulary of Program Behavior Data for Anomaly Detection. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion |
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina |
Detection and identification of network anomalies using sketch subspaces. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
defeat, anomaly detection, sketch, subspace method |
41 | Gaurav Tandon, Philip K. Chan, Debasis Mitra 0003 |
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data cleaning, motifs |
40 | Pedro Henriques dos Santos Teixeira, Ruy Luiz Milidiú |
Data stream anomaly detection through principal subspace tracking. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
data streams, anomaly detection, time series, dimensionality reduction, unsupervised learning |
40 | Hwa-Ju Lee, Kyung-Sook Lee, Ihn-Han Bae |
A weighted-dissimilarity-based anomaly detection method for mobile networks. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, mobile wireless networks, dissimilarity |
40 | Marcus Chang, Andreas Terzis, Philippe Bonnet |
Mote-Based Online Anomaly Detection Using Echo State Networks. |
DCOSS |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Real-time, Anomaly detection |
40 | Alessandro Frossi, Federico Maggi, Gian Luigi Rizzo, Stefano Zanero |
Selecting and Improving System Call Models for Anomaly Detection. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
System Call Models, Self Organizing Map, Anomaly Detection, Stochastic Models, Deterministic Models |
40 | Huijuan Lu, Jianguo Chen, Wei Wei |
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian networks, Anomaly detection |
40 | Oliver Obst, X. Rosalind Wang, Mikhail Prokopenko |
Using Echo State Networks for Anomaly Detection in Underground Coal Mines. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
coal mines, sensor networks, bayesian networks, anomaly detection, recurrent neural networks, echo state networks |
40 | Yang Li 0002, Li Guo 0001 |
TCM-KNN scheme for network anomaly detection using feature-based optimizations. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight |
40 | Salem Benferhat, Karim Tabia |
Context-based Profiling for Anomaly Intrusion Detection with Diagnosis. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Anomaly detection, diagnosis, traffic profiling |
40 | Pedro Casas, Lionel Fillatre, Sandrine Vaton, Igor V. Nikiforov |
Volume Anomaly Detection in Data Networks: An Optimal Detection Algorithm vs. the PCA Approach. |
FITraMEn |
2008 |
DBLP DOI BibTeX RDF |
Network Monitoring and Traffic Analysis, Optimal Volume Anomaly Detection, Network Traffic Modeling |
40 | Jinfu Wang 0001, John Bigham |
Anomaly detection in the case of message oriented middleware. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, message oriented middleware, self-protection |
40 | Yang Li 0002, Binxing Fang, Li Guo 0001, You Chen |
Network anomaly detection based on TCM-KNN algorithm. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
TCM-KNN algorithm, machine learning, network security, anomaly detection |
40 | Kenneth L. Ingham, Anil Somayaji |
A methodology for designing accurate anomaly detection systems. |
LANC |
2007 |
DBLP DOI BibTeX RDF |
web server security, intrusion detection, anomaly detection, HTTP |
40 | Sang Hyun Oh, Won Suk Lee |
Anomaly Intrusion Detection Based on Dynamic Cluster Updating. |
PAKDD |
2007 |
DBLP DOI BibTeX RDF |
Data Mining, Clustering, Intrusion Detection, Anomaly Detection |
40 | Prahlad Fogla, Wenke Lee |
Evading network anomaly detection systems: formal reasoning and practical techniques. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
polymorphic blending attack, anomaly detection, mimicry attack |
40 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
FADS: A Fuzzy Anomaly Detection System. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
data mining, anomaly detection, Fuzzy theory |
40 | Shrijit S. Joshi, Vir V. Phoha |
Investigating hidden Markov models capabilities in anomaly detection. |
ACM Southeast Regional Conference (1) |
2005 |
DBLP DOI BibTeX RDF |
anomaly detection system, hidden Markov models |
40 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Gray-box extraction of execution graphs for anomaly detection. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
system call monitor, intrusion detection, anomaly detection, control flow graph |
40 | John Zachary, John C. McEachen, Daniel W. Ettlich |
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection |
40 | Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato |
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Layered networks, PCA, Anomaly detection, User behavior, Co-occurrence matrix |
40 | Fabio A. González 0001, Dipankar Dasgupta |
Anomaly Detection Using Real-Valued Negative Selection. |
Genet. Program. Evolvable Mach. |
2003 |
DBLP DOI BibTeX RDF |
matching rule, self-organizing maps, anomaly detection, artificial immune systems, negative selection |
40 | Albert J. Höglund, Kimmo Hätönen, Antti S. Sorvari |
A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. |
IJCNN (5) |
2000 |
DBLP DOI BibTeX RDF |
Self-Organizing Map (SOM), anomaly detection, novelty detection, host-based intrusion detection |
40 | Ulrike Lechner, Christian Lengauer, Friederike Nickl, Martin Wirsing |
(Objects + Concurrency) & Reusability - A Proposal to Circumvent the Inheritance Anomaly. |
ECOOP |
1996 |
DBLP DOI BibTeX RDF |
Concurrent rewriting, parallelism, reusability, Maude, inheritance anomaly |
38 | Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka |
Detecting and Identifying Network Anomalies by Component Analysis. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
Network anomalies, Anomaly identification, Principal component analysis, Anomaly detection, Traffic analysis |
36 | Jiong Zhang, Mohammad Zulkernine, Anwar Haque |
Random-Forests-Based Network Intrusion Detection Systems. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jiong Zhang, Mohammad Zulkernine |
A Hybrid Network Intrusion Detection Technique Using Random Forests. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Hybrid detection, Data mining, Intrusion detection, Network security, Random forests |
36 | Lobel Crnogorac, Anand S. Rao, Kotagiri Ramamohanarao |
Classifying Inheritance Mechanisms in Concurrent Object Oriented Programming. |
ECOOP |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Yang Li 0002, Li Guo 0001, Binxing Fang, Xiangtao Liu, Lin Qi |
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
36 | See-hwan Yoo, Tae-Kyung Kim, Chuck Yoo |
Resolving Performance Anomaly Using ARF-Aware TCP. |
SEUS |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Junsup Lee, Sung Deok Cha |
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Xinguang Peng, Yanyan Zhang |
Robust Host Anomaly Detector Using Strong Isolation. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Martin Rehák, Michal Pechoucek, Martin Grill, Karel Bartos |
Trust-Based Classifier Combination for Network Anomaly Detection. |
CIA |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Ji Zhang, Qigang Gao, Hai H. Wang |
Anomaly detection in high-dimensional network data streams: A case study. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Takuo Nakashima, Shunsuke Oshima, Yusuke Nishikido, Toshinori Sueyoshi |
Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 16067 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|