Sciweavers

703 search results - page 18 / 141
» Graph-based anomaly detection
Sort
View
ACSC
2005
IEEE
14 years 2 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
CSDA
2010
124views more  CSDA 2010»
13 years 8 months ago
Statistical inference on attributed random graphs: Fusion of graph features and content
Abstract: Fusion of information from graph features and content can provide superior inference for an anomaly detection task, compared to the corresponding content-only or graph fe...
John Grothendieck, Carey E. Priebe, Allen L. Gorin
CLEAR
2006
Springer
133views Biometrics» more  CLEAR 2006»
14 years 10 days ago
Multi-feature Graph-Based Object Tracking
We present an object detection and tracking algorithm that addresses the problem of multiple simultaneous targets tracking in realworld surveillance scenarios. The algorithm is bas...
Murtaza Taj, Emilio Maggio, Andrea Cavallaro
CIDM
2009
IEEE
14 years 3 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder

Publication
226views
12 years 7 months ago
Modelling Multi-object Activity by Gaussian Processes
We present a new approach for activity modelling and anomaly detection based on non-parametric Gaussian Process (GP) models. Specifically, GP regression models are formulated to l...
Chen Change Loy, Tao Xiang, Shaogang Gong