Sciweavers

1503 search results - page 78 / 301
» Detecting Anomalies in Graphs
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
15 years 2 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
CORR
2011
Springer
213views Education» more  CORR 2011»
14 years 11 months ago
Adapting to Non-stationarity with Growing Expert Ensembles
Forecasting sequences by expert ensembles generally assumes stationary or near-stationary processes; however, in complex systems and many real-world applications, we are frequentl...
Cosma Rohilla Shalizi, Abigail Z. Jacobs, Aaron Cl...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 10 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
16 years 4 months ago
Online novelty detection on temporal sequences
: Novelty detection, or anomaly detection, on temporal sequences has increasingly attracted attention from researchers in different areas. In this paper, we present a new framework...
Junshui Ma, Simon Perkins
ICIAP
2005
ACM
16 years 4 months ago
Learning Intrusion Detection: Supervised or Unsupervised?
Abstract. Application and development of specialized machine learning techniques is gaining increasing attention in the intrusion detection community. A variety of learning techniq...
Pavel Laskov, Patrick Düssel, Christin Sch&au...