Sciweavers

912 search results - page 24 / 183
» Anomaly
Sort
View
ICPR
2010
IEEE
13 years 12 months ago
Lattice-Based Anomaly Rectification for Sport Video Annotation
Anomaly detection has received much attention within the literature as a means of determining, in an unsupervised manner, whether a learning domain has changed in a fundamental way...
Aftab Khan, David Windridge, Teofilo De Campos
ACSAC
2004
IEEE
13 years 11 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
13 years 11 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
JSS
2008
113views more  JSS 2008»
13 years 7 months ago
A model for software rework reduction through a combination of anomaly metrics
Analysis of anomalies reported during testing of a project can tell a lot about how well the processes and products work. Still, organizations rarely use anomaly reports for more t...
Lars-Ola Damm, Lars Lundberg, Claes Wohlin
RAID
2010
Springer
13 years 5 months ago
What Is the Impact of P2P Traffic on Anomaly Detection?
Abstract. Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detectio...
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Kh...