Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   5  
      Cognitive ScienceArtificial IntelligenceAnomaly DetectionOutlier detection
    • by 
    •   15  
      Computer ScienceSoftware EngineeringArtificial Immune SystemsUnix
    • by 
    •   17  
      Computer ScienceExpert SystemsData MiningComputer Networks
    • by 
    •   12  
      Distributed ComputingEvolutionary ComputationComputer SecurityAnomaly Detection
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current... more
    • by 
    •   9  
      Distributed ComputingAnomaly DetectionOPERATING SYSTEMNetwork Intrusion Detection & Prevention
    • by 
    •   7  
      Anomaly DetectionNetwork Intrusion Detection & PreventionIntrusion DetectionOutlier detection
    • by 
    •   5  
      Information SecurityAnomaly DetectionIntrusion Detection SystemBig Data Applications
    • by 
    •   15  
      Computer ScienceInformation TheoryData AnalysisCase Studies
    • by 
    •   4  
      Anomaly DetectionIntrusion DetectionRaidAnomaly based network intrusion detection
    • by 
    •   17  
      Information SystemsData MiningHealth insuranceAnomaly Detection
    • by 
    •   14  
      Information SystemsAlgorithmsArtificial IntelligenceAnomaly Detection
    • by 
    •   11  
      Information SystemsData MiningAnomaly DetectionData Structure
    • by 
    •   9  
      Situation awarenessMotion AnalysisAnomaly DetectionStatistical Learning
    • by 
    •   13  
      GeophysicsImage ProcessingAnomaly DetectionGeoscience and remote sensing
    • by 
    •   10  
      Machine LearningAnomaly DetectionIntrusion DetectionDecision Tree
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection approaches. This hybrid Intrusion Detection System architecture consists of an anomaly detection module, a misuse... more
    • by 
    •   12  
      Anomaly DetectionDecision support systemDecision TreesComputer Network
    • by 
    •   11  
      Machine LearningAnomaly DetectionFeature SelectionIntrusion Detection
    • by 
    •   4  
      Machine LearningAnomaly DetectionProbability Distribution & ApplicationsMixture Model
    • by 
    •   15  
      Remote SensingSupport Vector MachinesAnomaly DetectionTelevision
    • by 
    •   7  
      Data MiningAutomataConvergenceAnomaly Detection
    • by 
    •   9  
      Anomaly DetectionMobile Ad Hoc NetworkIntrusion DetectionManet
    • by 
    •   9  
      Situation awarenessAnomaly DetectionEntropyIncremental learning
    • by 
    •   8  
      Principal Component AnalysisAnomaly DetectionLinear ModelWavelet Transform
    • by 
    •   8  
      TechnologyAnomaly DetectionMathematical SciencesArtificial Immune System
    • by  and +1
    •   4  
      Time SeriesAnomaly DetectionStatistical InferenceNumerical Analysis and Computational Mathematics
    • by 
    •   2  
      Statistical Signal ProcessingAnomaly Detection
    • by 
    •   20  
      ObstetricsFertilityUltrasoundAnomaly Detection
    • by 
    •   20  
      GeophysicsAlgorithmsStatisticsRemote Sensing
    • by 
    •   47  
      Cognitive ScienceDentistryNonprofit StudiesEmployment Law
    • by 
    •   17  
      Data MiningMobile Ad Hoc NetworksComputer NetworksCryptography
Conditional Anomaly Detection ... However, in contrast to problems in supervised learning where studies of classification accuracy are the norm, little research has systematically addressed the issue of accuracy in general-purpose... more
    • by 
    •   5  
      Data MiningData AnalysisAnomaly DetectionDomain Knowledge
    • by 
    •   7  
      Anomaly DetectionProtocolMobile DeviceCertificate
    • by 
    •   10  
      EngineeringTechnologyData MiningComputer Networks
    • by 
    •   12  
      EngineeringTechnologyPolymorphismComputer Networks
    • by 
    •   12  
      Data MiningFuzzy LogicFuzzy SetsFuzzy Systems
    • by 
    •   26  
      Computer ScienceAlgorithmsComputer ArchitectureInformation Retrieval
    • by 
    •   3  
      Anomaly DetectionIntrusion DetectionNetwork Traffic
    • by 
    •   11  
      Time SeriesAnomaly DetectionSingular value decompositionData Mining and Knowledge Discovery
    • by 
    •   8  
      Cognitive ScienceDistributed ComputingAnomaly DetectionIntrusion Detection
    • by 
    •   21  
      Nonparametric StatisticsBritishRisk assessmentAnomaly Detection
    • by 
    •   9  
      Anomaly DetectionInformation ProcessingMulti Agent SystemInformation Systems Security
    • by 
    •   4  
      Anomaly DetectionSystem DesignProof of ConceptFalse Positive
Videos represent the primary source of information for surveillance applications and are available in large amounts but in most cases contain little or no annotation for supervised learning. This article reviews the state-of-the-art deep... more
    • by 
    •   4  
      Computer VisionAnomaly DetectionVideo SurveillanceDeep Learning
    • by  and +1
    •   14  
      Distributed ComputingComputer NetworksPower SystemIntrusion Detection Systems
    • by 
    •   5  
      Statistical AnalysisAnomaly DetectionInformation FusionNovelty Detection
    • by 
    •   12  
      Distributed ComputingNetwork SecurityDoS AttackAnomaly Detection
    • by 
    •   10  
      Computer NetworksAnomaly DetectionComputer NetworkIntrusion Detection
    • by 
    •   6  
      Network ManagementAnomaly DetectionSampling methodsSecurity Analysis
    • by 
    •   3  
      Anomaly DetectionEmpirical EvaluationNetwork Traffic Analysis
    • by 
    •   11  
      Computer ArchitectureDistributed ComputingComputer SecurityComputer Hardware