Sciweavers

1503 search results - page 69 / 301
» Detecting Anomalies in Graphs
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
CIKM
2007
Springer
15 years 10 months ago
Detecting distance-based outliers in streams of data
In this work a method for detecting distance-based outliers in data streams is presented. We deal with the sliding window model, where outlier queries are performed in order to de...
Fabrizio Angiulli, Fabio Fassetti
IM
2007
15 years 5 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 1 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
ICDM
2008
IEEE
126views Data Mining» more  ICDM 2008»
15 years 10 months ago
Detecting Suspicious Behavior in Surveillance Images
We introduce a novel technique to detect anomalies in images. The notion of normalcy is given by a baseline of images, under the assumption that the majority of such images is nor...
Daniel Barbará, Carlotta Domeniconi, Zoran ...