Sciweavers

677 search results - page 76 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
14 years 2 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
VIZSEC
2005
Springer
14 years 1 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
CW
2003
IEEE
14 years 1 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
ICML
2010
IEEE
13 years 9 months ago
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes
Most existing algorithms for clinical risk stratification rely on labeled training data. Collecting this data is challenging for clinical conditions where only a small percentage ...
Zeeshan Syed, Ilan Rubinfeld
GIS
2008
ACM
14 years 9 months ago
Data mining for visual exploration and detection of ecosystem disturbances
This paper presents a case study on the application of data mining to the problem of detecting ecosystem disturbances from vegetation cover data obtained from satellite observatio...
Haibin Cheng, Pang-Ning Tan, Christopher Potter, S...