Sciweavers

990 search results - page 20 / 198
» An efficient data structure for network anomaly detection
Sort
View
IAT
2008
IEEE
14 years 2 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
ISPA
2007
Springer
14 years 2 months ago
ECG Anomaly Detection via Time Series Analysis
—Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g...
Mooi Choo Chuah, Fen Fu
ISI
2007
Springer
14 years 2 months ago
Detecting Anomalies in Graphs
Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
David B. Skillicorn
ICASSP
2011
IEEE
12 years 11 months ago
Online anomaly detection with expert system feedback in social networks
In this paper, we propose examining the participants in various meetings or communications within a social network, and using sequential inference based on these participant lists...
Corinne Horn, Rebecca Willett
RAID
1999
Springer
14 years 3 days ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen