Sciweavers

703 search results - page 63 / 141
» Graph-based anomaly detection
Sort
View
PST
2008
13 years 10 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
JFP
2007
103views more  JFP 2007»
13 years 8 months ago
Warnings for pattern matching
We examine the ML pattern-matching anomalies of useless clauses and non-exhaustive matches. We state the definition of these anomalies, building upon pattern matching semantics, ...
Luc Maranget
AIPR
2008
IEEE
13 years 10 months ago
Detection of ephemeral changes in sequences of images
The formalism of anomalous change detection, which was developed for finding unusual changes in pairs of images, is extended to sequences of more than two images. Extended algorith...
James Theiler, Steven M. Adler-Golden
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 8 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
14 years 9 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider