Sciweavers

1503 search results - page 84 / 301
» Detecting Anomalies in Graphs
Sort
View
FLAIRS
2004
15 years 5 months ago
Interactive Refinement of a Knowledge Base
This paper presents a new method of interactive refinement of a knowledge base. The first step of our method is a validation stage which checks the consistency and the completenes...
R. Djelouah, Béatrice Duval, Stéphan...
ICDCS
2006
IEEE
15 years 10 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 10 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
CCCG
2008
15 years 5 months ago
On the Complexity of Point Recolouring in Geometric Graphs
Given a collection of points representing geographic data we consider the task of delineating boundaries based on the features of the points. Assuming that the features are binary...
Henk Meijer, Yurai Núñez Rodrí...
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
15 years 11 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley