Sciweavers

703 search results - page 52 / 141
» Graph-based anomaly detection
Sort
View
INFOCOM
2011
IEEE
13 years 3 days ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
CVPR
2008
IEEE
14 years 10 months ago
Probabilistic image registration and anomaly detection by nonlinear warping
Automatic, defect tolerant registration of transmission electron microscopy (TEM) images poses an important and challenging problem for biomedical image analysis, e.g. in computat...
Verena Kaynig, Bernd Fischer, Joachim M. Buhmann
CISS
2008
IEEE
14 years 3 months ago
Unsupervised distributional anomaly detection for a self-diagnostic speech activity detector
— One feature that classification algorithms typically lack is the ability to know what they do not know. With this knowledge an algorithm would be able to operate in any domain...
Nash M. Borges, Gerard G. L. Meyer
AUSAI
2006
Springer
14 years 13 days ago
Detecting Anomalies and Intruders
Brittleness is a well-known problem in expert systems where a conclusion can be made, which human common sense would recognise as impossible e.g. that a male is pregnant. We have e...
Akara Prayote, Paul Compton
IJNSEC
2008
137views more  IJNSEC 2008»
13 years 8 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh