Sciweavers

799 search results - page 18 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 2 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
14 years 1 months ago
Applying both positive and negative selection to supervised learning for anomaly detection
This paper presents a novel approach of applying both positive selection and negative selection to supervised learning for anomaly detection. It first learns the patterns of the n...
Xiaoshu Hang, Honghua Dai
BTW
2009
Springer
127views Database» more  BTW 2009»
14 years 2 months ago
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles
: In the past couple of years, sensor networks have evolved to a powerful infrastructure component for monitoring and tracking events and phenomena in many application domains. An ...
Conny Franke, Marcel Karnstedt, Daniel Klan, Micha...
CRITIS
2009
13 years 5 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
SAC
2008
ACM
13 years 7 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer