Sciweavers

703 search results - page 25 / 141
» Graph-based anomaly detection
Sort
View
DSN
2005
IEEE
15 years 8 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
CORR
2007
Springer
124views Education» more  CORR 2007»
15 years 2 months ago
Graph-Based Decoding in the Presence of ISI
We propose a new graph representation for ISI channels that can be used for combined equalization and decoding by linear programming (LP) or iterative message-passing (IMP) decodi...
Mohammad H. Taghavi, Paul H. Siegel
TCAD
2008
75views more  TCAD 2008»
15 years 2 months ago
An Efficient Graph-Based Algorithm for ESD Current Path Analysis
Abstract--The electrostatic discharge (ESD) problem has become a challenging reliability issue in nanometer-circuit design. High voltages that resulted from ESD might cause high cu...
Chih-Hung Liu, Hung-Yi Liu, Chung-Wei Lin, Szu-Jui...
PAKDD
2010
ACM
169views Data Mining» more  PAKDD 2010»
15 years 7 months ago
oddball: Spotting Anomalies in Weighted Graphs
Given a large, weighted graph, how can we find anomalies? Which rules should be violated, before we label a node as an anomaly? We propose the OddBall algorithm, to find such nod...
Leman Akoglu, Mary McGlohon, Christos Faloutsos
DMIN
2007
110views Data Mining» more  DMIN 2007»
15 years 3 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder