Sciweavers

912 search results - page 69 / 183
» Anomaly
Sort
View
CCS
2008
ACM
13 years 10 months ago
Automatic feature selection for anomaly detection
Marius Kloft, Ulf Brefeld, Patrick Düssel, Ch...
FEGC
2010
161views Biometrics» more  FEGC 2010»
13 years 10 months ago
Detecting anomalies in data streams using statecharts
The environment around us is progressively equipped with various sensors, producing data continuously. The applications using these data face many challenges, such as data stream i...
Vasile-Marian Scuturici, Dan-Mircea Suciu, Romain ...
DIMVA
2007
13 years 10 months ago
Passive Monitoring of DNS Anomalies
We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect unusual behaviour. Our DNS response data have included typ...
Bojan Zdrnja, Nevil Brownlee, Duane Wessels
SEC
2008
13 years 10 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...
ICMLA
2003
13 years 10 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri