Sciweavers

357 search results - page 48 / 72
» Anomaly Detection Using Process Mining
Sort
View
FTCS
1993
111views more  FTCS 1993»
13 years 11 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski
ANSS
2006
IEEE
14 years 3 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
KDD
2004
ACM
157views Data Mining» more  KDD 2004»
14 years 3 months ago
On detecting space-time clusters
Detection of space-time clusters is an important function in various domains (e.g., epidemiology and public health). The pioneering work on the spatial scan statistic is often use...
Vijay S. Iyengar
GIS
2010
ACM
13 years 7 months ago
A data stream-based evaluation framework for traffic information systems
Traffic information systems based on mobile, in-car sensor technology are a challenge for data management systems as a huge amount of data has to be processed in real-time. Data m...
Sandra Geisler, Christoph Quix, Stefan Schiffer
ASSETS
2007
ACM
14 years 1 months ago
Data visualisation and data mining technology for supporting care for older people
: The overall purpose of the research discussed here is the enhancement of home-based care by revealing individual patterns in the life of a person, through modelling of the "...
Nubia M. Gil, Nick A. Hine, John L. Arnott, Julien...