Sciweavers

703 search results - page 48 / 141
» Graph-based anomaly detection
Sort
View
USS
2004
13 years 10 months ago
On Gray-Box Program Tracking for Anomaly Detection
Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precis...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
CVPR
2009
IEEE
15 years 3 months ago
Learning General Optical Flow Subspaces for Egomotion Estimation and Detection of Motion Anomalies
This paper deals with estimation of dense optical flow and ego-motion in a generalized imaging system by exploiting probabilistic linear subspace constraints on the flow. We dea...
Richard Roberts (Georgia Institute of Technology),...
EDBTW
2010
Springer
14 years 3 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
13 years 6 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...
ISSRE
2003
IEEE
14 years 1 months ago
Anomalies as Precursors of Field Failures
Reproducing and learning from failures in deployed software is costly and difficult. Those activities can be facilitated, however, if the circumstances leading to a failure are p...
Sebastian G. Elbaum, Satya Kanduri, Anneliese Amsc...