Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many cur- rent IDSs are constructed by manual encoding of ex- pert security knowledge,... more
    • by 
    •   7  
      Data MiningMachine TranslationAnomaly DetectionIntrusion Detection
    • by 
    •   10  
      Statistical ComputingPrincipal Component AnalysisIndependent Component AnalysisAnomaly Detection
    • by 
    •   8  
      Anomaly DetectionOil SpillInfraredMarine Environment
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this... more
    • by 
    •   8  
      Artificial Immune SystemsAnomaly DetectionArtificial IntelligentDendritic cell
    • by 
    •   9  
      Fault DetectionTraffic EngineeringAnomaly DetectionProtocols
As computer systems continue to grow in scale and complexity, performance problems become common and a major concern for large-scale computing. Performance anomalies caused by application bugs, hardware or software faults, or resource... more
    • by 
    •   3  
      Clustering AlgorithmsAnomaly DetectionLarge scale systems
    • by 
    •   12  
      Anomaly DetectionHumansSensorineural Hearing LossThyroid gland
    • by 
    •   2  
      Anomaly DetectionPeer to Peer
    • by 
    •   14  
      Information TechnologyBusiness IntelligenceAnomaly DetectionEnergy Management
    • by 
    •   8  
      Distributed ComputingAnomaly DetectionResource useTraffic analysis
Abstract This paper advocates a problem-oriented approach for the design of artificial immune systems (AIS) for data mining. By problem-oriented approach we mean that, in real-world data mining applications the design of an AIS should... more
    • by 
    •   8  
      Information SystemsMachine LearningData MiningAnomaly Detection
    • by 
    •   6  
      Artificial Immune SystemsAnomaly DetectionPositive SelectionHigh Dimensionality
In this whitepaper we briey describe Masibty, a novel anomaly-based web application rewall we devised. It has a modular and extensible structure. We give an overview of the anomaly detection models we im- plemented in it, and show that it... more
    • by 
    •   3  
      Anomaly DetectionPerforationIntrusion Prevention System
In this paper we analyze the use of different types of statistical tests for the correlation of anomaly detection alerts. We show that the Granger Causality Test, one of the few proposals that can be extended to the anomaly detection... more
    • by 
    •   4  
      Anomaly DetectionStatistical TestGranger Causality TestAlert correlation
The construction and maintenance of a medical thesaurus is a non-trivial task, due to the inherent complexity of a proper medical terminology. We present a methodology for transaction-based anomaly detection in the process of thesaurus... more
    • by 
    •   7  
      Anomaly DetectionQuality ControlMethodsLibrary and Information Studies
The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to... more
    • by 
    •   14  
      Machine LearningSocial GroupsAnomaly DetectionSocial Networking Services
Anomaly detection systems are usually employed to monitor database activities in order to detect security incidents. These systems raise alerts when anomalous activities are detected. The alerts raised have to be analyzed to timely... more
    • by  and +1
    •   8  
      Risk assessmentRisk Assessment & Risk ManagementDatabase Anomaly DetectionAnomaly Detection
Accurate prediction of applications’ performance and functional behavior is a critical component for a wide range of tools, including anomaly detection, task scheduling and approximate computing. Statistical modeling is a very powerful... more
    • by  and +2
    •   32  
      Computer ScienceSoftware EngineeringComputer EngineeringSystems Engineering
Course Outline and summary of what has been and can be provided for special workshops, courses, and trainings.  Pertaining heavily to the mathematics and computational modeling, and the applications thereof.
    • by 
    •   11  
      TerrorismInternational SecuritySecurityPattern Recognition
Anomaly detection is one of the major areas of research with the tremendous development of computer networks. Any intrusion detection model designed should have the ability to visualize high dimensional data with high processing and... more
    • by 
    •   3  
      Network SecurityAnomaly DetectionSelf Organizing Networks
    • by 
    •   3  
      Network SecurityAnomaly DetectionGeneral theory of Entropy
Relational reasoning, which has been defined as the ability to discern meaningful patterns within any informational stream, is a foundational cognitive ability associated with education, including in scientific domains. This study... more
    • by 
    •   6  
      Cognitive ScienceEducational ResearchAnalogy (Cognitive Psychology)Case-Based Reasoning
    • by 
    •   5  
      Anomaly DetectionFeature SelectionIDSBees Algorithm
In binary classification there are two types of errors, and in many applications these may have very different costs. We consider two learning frameworks that address this issue: minimax classification, where we seek to minimize the... more
    • by 
    •   4  
      Classification (Machine Learning)Support Vector MachinesStatistical machine learningAnomaly Detection
    • by 
    •   7  
      Artificial IntelligenceMultiagent SystemsNetwork SecurityComputer Security
    • by  and +1
    •   6  
      Multiagent SystemsNetwork SecurityComputer SecurityIntrusion Detection Systems
    • by 
    •   3  
      Information TheoryInternet MeasurementAnomaly Detection
Attacks, such as port scans, DDoS and worms, threaten the functionality and reliability of IP networks. Early and accurate detection is crucial to mitigate their impact. We use the Method of Remaining Elements (MRE) to detect anomalies... more
    • by 
    •   20  
      Computer ScienceDistributed ComputingRemote SensingIntrusion Detection Systems
Due to the increasing deployment of vehicles in human societies and the necessity for smart traffic control, anomaly detection is among the various tasks widely employed in traffic monitoring. As the issue of urban traffic and their... more
    • by 
    •   9  
      Computer ScienceArtificial IntelligenceAnomaly DetectionDeep Learning
    • by 
    •   9  
      GeneticsMedicineAnomaly DetectionOptic Nerve
    • by 
    •   5  
      MathematicsComputer ScienceData MiningAnomaly Detection
    • by 
    •   20  
      Computer ScienceDistributed ComputingComputational ComplexityAnomaly Detection
Uncertain data management, querying and mining have become important because the majority of real world data is accompanied with uncertainty these days. Uncertainty in data is often caused by the deficiency in underlying data collecting... more
    • by 
    •   5  
      Computer ScienceData MiningAnomaly DetectionOutlier
    • by 
    •   10  
      Computer ScienceArtificial IntelligenceA Priori KnowledgeAnomaly Detection
... Japkowicz [6] used an autoencoder neural network to detect faults in gearboxes. ... Several types of neural networks have been proposed for novelty detection including Autoassociators [6 ... A control system was created using a... more
    • by 
    •   12  
      EngineeringMechanical EngineeringCivil EngineeringComputer Science
    • by 
    •   14  
      Cognitive ScienceComputer ScienceArtificial IntelligenceDigital Signal Processing
    • by 
    •   5  
      Data MiningScientometricsAcademic Social NetworkingAnomaly Detection
... Arshad Ali, Modood Ahmad Khan, S. Azam H. Bukhari and Waqar Mahmood1 drarshad@niit. edu.pk, 55Modood@niit.edu.pk, 55azam@niit.edu ... Cottrell, Connie Logg, Jiri Nivartili, William Jerrod of SLAC-Stanford, Ejaz Ahmed, Zaheer A. Khan,... more
    • by 
    •   7  
      Computer ScienceArtificial IntelligencePrincipal Component AnalysisAnomaly Detection
Techniques for anomaly detection in the maritime domain are developed in this thesis using an area metric that measures the degree of similarity, or distinction, between ships’ tracks using the area between ships’ tracks. A modified... more
    • by 
    •   3  
      Anomaly DetectionConditional probabilityBayes Theorem
    • by 
    •   4  
      EngineeringAnomaly DetectionQuality AssuranceCase Study
ABSTRACT Many approaches for anomaly detection use statistical based methods that build profiles of normality. In these cases, anomalies are defined as deviations from normal models build from representative data. Detection systems based... more
    • by 
    •   10  
      Computer ScienceHuman Computer InteractionUsabilitySituation awareness
    • by 
    •   8  
      MathematicsComputer ScienceArtificial IntelligenceMachine Learning
ABSTRACT The utilization of uniform eddy current techniques to detect anomalies in conductive plates represents an important issue. This article presents novel uniform eddy current probe architecture with a planar excitation coil and a... more
    • by 
    •   18  
      EngineeringImage ProcessingMagnetic Resonance ImagingGiant Magnetoresistance
Smart meters have become a core part of the Internet of Things, and its sensory network is increasing globally. For example, in the UK there are over 15 million smart meters operating across homes and businesses. One of the main... more
    • by 
    •   5  
      Computer ScienceAnomaly DetectionQaIOT
    • by 
    •   9  
      MathematicsComputer ScienceArtificial Immune SystemsAnomaly Detection
    • by 
    •   4  
      Computer ScienceData MiningAnomaly DetectionCluster Analysis
    • by 
    •   8  
      Computer ScienceMachine LearningClustering and Classification MethodsInternet of Things
【Abstract】Intrusion Detection System(IDS) has beenharassed by false positive and false negative problem. Common IDS using single detection mode is hard to solve this problem effectively. This paper analyzes the characteristics of network... more
    • by 
    •   11  
      Computer ScienceComputer EngineeringAnomaly DetectionIntrusion Detection
The rapid progress of modern technologies generates a massive amount of highthroughput data, called Big Data, which provides opportunities to find new insights using machine learning (ML) algorithms. Big Data consist of many features... more
    • by 
    •   11  
      Computer ScienceMachine LearningEvolutionary ComputationAnomaly Detection
    • by 
    •   10  
      Distributed ComputingMachine LearningSmart GridAnomaly Detection