Sciweavers

677 search results - page 19 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
ACSC
2005
IEEE
14 years 1 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
CSDA
2010
124views more  CSDA 2010»
13 years 7 months ago
Statistical inference on attributed random graphs: Fusion of graph features and content
Abstract: Fusion of information from graph features and content can provide superior inference for an anomaly detection task, compared to the corresponding content-only or graph fe...
John Grothendieck, Carey E. Priebe, Allen L. Gorin
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder

Publication
226views
12 years 6 months ago
Modelling Multi-object Activity by Gaussian Processes
We present a new approach for activity modelling and anomaly detection based on non-parametric Gaussian Process (GP) models. Specifically, GP regression models are formulated to l...
Chen Change Loy, Tao Xiang, Shaogang Gong
COMCOM
2006
121views more  COMCOM 2006»
13 years 7 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou