Sciweavers

1503 search results - page 45 / 301
» Detecting Anomalies in Graphs
Sort
View
153
Voted
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 3 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
116
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
114
Voted
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
15 years 7 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
148
Voted
IV
2010
IEEE
150views Visualization» more  IV 2010»
15 years 2 months ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman
147
Voted
ICDM
2010
IEEE
168views Data Mining» more  ICDM 2010»
15 years 1 months ago
Anomaly Detection Using an Ensemble of Feature Models
We present a new approach to semi-supervised anomaly detection. Given a set of training examples believed to come from the same distribution or class, the task is to learn a model ...
Keith Noto, Carla E. Brodley, Donna K. Slonim