Sciweavers

357 search results - page 33 / 72
» Anomaly Detection Using Process Mining
Sort
View
DMIN
2009
119views Data Mining» more  DMIN 2009»
13 years 5 months ago
Abnormal Process State Detection by Cluster Center Point Monitoring in BWR Nuclear Power Plant
This paper proposes a new method to detect abnormal process state. The method is based on cluster center point monitoring in time and is demonstrated in its application to data fro...
Jaakko Talonen, Miki Sirola
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
14 years 8 months ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 2 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
WOSS
2004
ACM
14 years 1 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson