Sciweavers

119 search results - page 16 / 24
» NADA - Network Anomaly Detection Algorithm
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
SCIA
2007
Springer
118views Image Analysis» more  SCIA 2007»
14 years 2 months ago
Reconstruction of 3D Curves for Quality Control
In the area of quality control by vision, the reconstruction of 3D curves is a convenient tool to detect and quantify possible anomalies. Whereas other methods exist that allow us ...
Hanna Martinsson, François Gaspard, Adrien ...
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
14 years 14 hour ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 8 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
ASPLOS
2010
ACM
14 years 2 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli