Sciweavers

106 search results - page 17 / 22
» Mining Audit Data to Build Intrusion Detection Models
Sort
View
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
14 years 1 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 4 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
14 years 1 months ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
PAKDD
2009
ACM
171views Data Mining» more  PAKDD 2009»
14 years 4 days ago
Detecting Abnormal Events via Hierarchical Dirichlet Processes
Abstract. Detecting abnormal event from video sequences is an important problem in computer vision and pattern recognition and a large number of algorithms have been devised to tac...
Xian-Xing Zhang, Hua Liu, Yang Gao, Derek Hao Hu
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
14 years 8 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider