Sciweavers

357 search results - page 20 / 72
» Anomaly Detection Using Process Mining
Sort
View
PST
2004
13 years 9 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
CVPR
2009
IEEE
15 years 2 months ago
Learning General Optical Flow Subspaces for Egomotion Estimation and Detection of Motion Anomalies
This paper deals with estimation of dense optical flow and ego-motion in a generalized imaging system by exploiting probabilistic linear subspace constraints on the flow. We dea...
Richard Roberts (Georgia Institute of Technology),...
WWW
2008
ACM
14 years 8 months ago
Web graph similarity for anomaly detection (poster)
Web graphs are approximate snapshots of the web, created by search engines. Their creation is an error-prone procedure that relies on the availability of Internet nodes and the fa...
Panagiotis Papadimitriou 0002, Ali Dasdan, Hector ...
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
14 years 8 months ago
Online novelty detection on temporal sequences
: Novelty detection, or anomaly detection, on temporal sequences has increasingly attracted attention from researchers in different areas. In this paper, we present a new framework...
Junshui Ma, Simon Perkins
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...