Sciweavers

677 search results - page 42 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
ICIP
2007
IEEE
14 years 9 months ago
Unsupervised Modeling of Object Tracks for Fast Anomaly Detection
A key goal of far-field activity analysis is to learn the usual pattern of activity in a scene and to detect statistically anomalous behavior. We propose a method for unsupervised...
Tomas Izo, W. Eric L. Grimson
ICDCSW
2006
IEEE
14 years 1 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
AINA
2007
IEEE
13 years 8 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
FI
2010
130views more  FI 2010»
13 years 5 months ago
Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures
: Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown...
Martin Güthle, Jochen Kögel, Stefan Wahl...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 12 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley