Sciweavers

235 search results - page 33 / 47
» Network anomaly detection with incomplete audit data
Sort
View
RAID
2000
Springer
13 years 11 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
PKDD
2005
Springer
159views Data Mining» more  PKDD 2005»
14 years 1 months ago
Fast Burst Correlation of Financial Data
We examine the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. Our methodology is comprised of two steps: a burst dete...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
FLAIRS
2003
13 years 9 months ago
Automated Data Fusion and Situation Assessment in Space Systems
Spacecraft are key components of military operations and everyday life. To achieve space situation awareness, human operators must monitor large numbers of parameters. During off-...
Mark L. Hanson, Paul G. Gonsalves
ICDE
2005
IEEE
161views Database» more  ICDE 2005»
14 years 9 months ago
Network-Based Problem Detection for Distributed Systems
We introduce a network-based problem detection framework for distributed systems, which includes a data-mining method for discovering dynamic dependencies among distributed servic...
Hisashi Kashima, Tadashi Tsumura, Tsuyoshi Id&eacu...
MVA
2007
150views Computer Vision» more  MVA 2007»
13 years 9 months ago
Detecting the Degree of Anomal in Security Video
We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
Kyoko Sudo, Tatsuya Osawa, Xiaojun Wu, Kaoru Wakab...