Sciweavers

1503 search results - page 86 / 301
» Detecting Anomalies in Graphs
Sort
View
IROS
2007
IEEE
254views Robotics» more  IROS 2007»
15 years 10 months ago
3D datasets segmentation based on local attribute variation
— We present a Graph-based method for low-level segmentation of unfiltered 3D data. The core of this approach is based on the construction of a local neighborhood structure and ...
Carla Silva Rocha Aguiar, Sébastien Druon, ...
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
15 years 8 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICICS
2003
Springer
15 years 9 months ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
15 years 11 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
ISMIS
2009
Springer
15 years 11 months ago
Novelty Detection from Evolving Complex Data Streams with Time Windows
Abstract. Novelty detection in data stream mining denotes the identification of new or unknown situations in a stream of data elements flowing continuously in at rapid rate. This...
Michelangelo Ceci, Annalisa Appice, Corrado Loglis...