Sciweavers

1503 search results - page 50 / 301
» Detecting Anomalies in Graphs
Sort
View
MOBISYS
2008
ACM
16 years 3 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
WETICE
2005
IEEE
15 years 9 months ago
Entropy Based Worm and Anomaly Detection in Fast IP Networks
Detecting massive network events like worm outbreaks in fast IP networks, such as Internet backbones, is hard. One problem is that the amount of traffic data does not allow real-t...
Arno Wagner, Bernhard Plattner
RAID
2004
Springer
15 years 9 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
SOCIALCOM
2010
15 years 2 months ago
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and...
Yuhong Liu, Yan (Lindsay) Sun
CVPR
1998
IEEE
16 years 6 months ago
Anomaly Detection through Registration
We study an application of image registration in the medical domain. Based on a 3-D hierarchical deformable registration algorithm, we developed a prototype for automatic register...
Mei Chen, Takeo Kanade, Henry A. Rowley, Dean Pome...