Sciweavers

912 search results - page 63 / 183
» Anomaly
Sort
View
104
Voted
ISI
2007
Springer
15 years 8 months ago
Detecting Anomalies in Graphs
Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
David B. Skillicorn
119
Voted
IWSOS
2007
Springer
15 years 8 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
110
Voted
RAID
2007
Springer
15 years 8 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
98
Voted
CIG
2006
IEEE
15 years 8 months ago
Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network
— Over recent years, the fall in cost, and increased availability of motion capture equipment has led to an increase in non-specialist companies being able to use motion capture ...
Iain Miller, Stephen McGlinchey, Benoit Chaperot