Sciweavers

990 search results - page 14 / 198
» An efficient data structure for network anomaly detection
Sort
View
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ESWA
2008
172views more  ESWA 2008»
13 years 8 months ago
DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant
DADICC is the abbreviated name for an intelligent system able to detect on-line and diagnose anomalies as soon as possible in the dynamic evolution of the behaviour of a power pla...
Antonio L. Arranz Matía, Alberto Cruz, Migu...
ACMSE
2005
ACM
14 years 1 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
NOMS
2008
IEEE
141views Communications» more  NOMS 2008»
14 years 2 months ago
Detecting BGP anomalies with wavelet
—In this paper, we propose a BGP anomaly detection framework called BAlet that delivers both temporal and spatial localization of the potential anomalies. It requires only a simp...
Jianning Mai, Lihua Yuan, Chen-Nee Chuah
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
13 years 9 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...