Sciweavers

703 search results - page 35 / 141
» Graph-based anomaly detection
Sort
View
SAC
2008
ACM
13 years 8 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 3 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
ICNS
2007
IEEE
14 years 3 months ago
Data fusion algorithms for network anomaly detection: classification and evaluation
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
Vasilis Chatzigiannakis, Georgios Androulidakis, K...
ISPA
2007
Springer
14 years 2 months ago
ECG Anomaly Detection via Time Series Analysis
—Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g...
Mooi Choo Chuah, Fen Fu
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 8 months ago
Dendritic Cells for Real-Time Anomaly Detection
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the ystem. The behaviour of human DCs is abstracted to form an algorithm suitable...
Julie Greensmith, Uwe Aickelin