Sciweavers

912 search results - page 98 / 183
» Anomaly
Sort
View
152
Voted
AAAI
2012
13 years 5 months ago
Learning Behavior Models for Hybrid Timed Systems
A tailored model of a system is the prerequisite for various analysis tasks, such as anomaly detection, fault identification, or quality assurance. This paper deals with the algo...
Oliver Niggemann, Benno Stein, Asmir Vodencarevic,...
GIS
2008
ACM
16 years 3 months ago
Data mining for visual exploration and detection of ecosystem disturbances
This paper presents a case study on the application of data mining to the problem of detecting ecosystem disturbances from vegetation cover data obtained from satellite observatio...
Haibin Cheng, Pang-Ning Tan, Christopher Potter, S...
107
Voted
CIS
2007
Springer
15 years 8 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang
99
Voted
ENC
2006
IEEE
15 years 8 months ago
Cleaning Training-Datasets with Noise-Aware Algorithms
We introduce a novel learning algorithm for noise elimination. Our algorithm is based on the re-measurement idea for the correction of erroneous observations and is able to discri...
H. Jair Escalante
CIS
2005
Springer
15 years 8 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim