Sciweavers

1503 search results - page 91 / 301
» Detecting Anomalies in Graphs
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 4 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
WWW
2010
ACM
15 years 11 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 5 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
TIP
2008
169views more  TIP 2008»
15 years 4 months ago
Weakly Supervised Learning of a Classifier for Unusual Event Detection
In this paper, we present an automatic classification framework combining appearance based features and Hidden Markov Models (HMM) to detect unusual events in image sequences. One...
Mark Jager, Christian Knoll, Fred A. Hamprecht
TSMC
2011
228views more  TSMC 2011»
14 years 11 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...