Sciweavers

1503 search results - page 13 / 301
» Detecting Anomalies in Graphs
Sort
View
148
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
187
Voted
CNSR
2011
IEEE
257views Communications» more  CNSR 2011»
14 years 7 months ago
On Threshold Selection for Principal Component Based Network Anomaly Detection
—Principal component based anomaly detection has emerged as an important statistical tool for network anomaly detection. It works by projecting summary network information onto a...
Petar Djukic, Biswajit Nandy
147
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
132
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 3 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
154
Voted
CVPR
2005
IEEE
16 years 5 months ago
Detection and Explanation of Anomalous Activities: Representing Activities as Bags of Event n-Grams
We present a novel representation and method for detecting and explaining anomalous activities in a video stream. Drawing from natural language processing, we introduce a represen...
Raffay Hamid, Amos Y. Johnson, Samir Batta, Aaron ...