Sciweavers

188 search results - page 14 / 38
» Anomaly Detection Using the Dempster-Shafer Method
Sort
View
AUSAI
2003
Springer
14 years 29 days ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho
ICPR
2010
IEEE
13 years 5 months ago
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes
Detecting abnormal behaviors in crowd scenes is quite important for public security and has been paid more and more attentions. Most previous methods use offline trained model to p...
Jie Feng, Chao Zhang, Pengwei Hao
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 8 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
INFOCOM
2010
IEEE
13 years 6 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
ICIP
2007
IEEE
14 years 9 months ago
Unsupervised Modeling of Object Tracks for Fast Anomaly Detection
A key goal of far-field activity analysis is to learn the usual pattern of activity in a scene and to detect statistically anomalous behavior. We propose a method for unsupervised...
Tomas Izo, W. Eric L. Grimson