Sciweavers

765 search results - page 12 / 153
» Detecting Anomalies and Intruders
Sort
View
COMCOM
2007
98views more  COMCOM 2007»
13 years 9 months ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry
DSOM
2007
Springer
14 years 3 months ago
NADA - Network Anomaly Detection Algorithm
This paper deals with a new iterative Network Anomaly Detection Algorithm – NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA f...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
ICIP
2010
IEEE
13 years 7 months ago
Video anomaly detection in spatiotemporal context
Compared to other approaches that analyze object trajectories, we propose to detect anomalous video events at three levels considering spatiotemporal context of video objects, i.e...
Fan Jiang, Junsong Yuan, Sotirios A. Tsaftaris, Ag...
GLOBECOM
2009
IEEE
14 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
IDA
2007
Springer
13 years 9 months ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder