Sciweavers

82 search results - page 7 / 17
» Principled Sampling for Anomaly Detection
Sort
View
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
14 years 12 days ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
IAW
2003
IEEE
14 years 1 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
AMR
2006
Springer
137views Multimedia» more  AMR 2006»
14 years 8 days ago
A General Principled Method for Image Similarity Validation
A novel and general criterion for image similarity validation is introduced using the so-called a contrario decision framework. It is mathematically proved that it is possible to c...
Frédéric Cao, Patrick Bouthemy
CCS
2009
ACM
14 years 3 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
FLAIRS
2010
13 years 11 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves