Sciweavers

912 search results - page 63 / 183
» Anomaly
Sort
View
ISI
2007
Springer
14 years 3 months ago
Detecting Anomalies in Graphs
Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
David B. Skillicorn
IWSOS
2007
Springer
14 years 3 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
RAID
2007
Springer
14 years 2 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
CIG
2006
IEEE
14 years 2 months ago
Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network
— Over recent years, the fall in cost, and increased availability of motion capture equipment has led to an increase in non-specialist companies being able to use motion capture ...
Iain Miller, Stephen McGlinchey, Benoit Chaperot