Sciweavers

703 search results - page 21 / 141
» Graph-based anomaly detection
Sort
View
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
13 years 10 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...
FEGC
2009
94views Biometrics» more  FEGC 2009»
13 years 6 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ICNC
2005
Springer
14 years 2 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
ICDCS
2003
IEEE
14 years 1 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu