Anomaly detection

Results: 503



#Item
101

Systematic Construction of Anomaly Detection Benchmarks from Real Data Andrew F. Emmott, Shubhomoy Das, Thomas Dietterich, Alan Fern, Weng-Keen Wong Oregon State University School of EECS Corvallis, Oregon, USA

Add to Reading List

Source URL: web.engr.oregonstate.edu

Language: English - Date: 2013-07-03 23:08:07
    102

    Gray-Box Extraction of Execution Graphs for Anomaly Detection Debin Gao∗ Michael K. Reiter†

    Add to Reading List

    Source URL: flyer.sis.smu.edu.sg

    Language: English - Date: 2014-12-17 01:40:50
      103

      Online Anomaly Detection under Adversarial Impact Marius Kloft University of California, Berkeley, USA Abstract

      Add to Reading List

      Source URL: www-rsec.cs.uni-tuebingen.de

      Language: English - Date: 2010-06-08 13:08:50
        104

        Gray-Box Anomaly Detection using System Call Monitoring by Debin Gao

        Add to Reading List

        Source URL: www.cs.unc.edu

        Language: English - Date: 2007-06-05 22:23:37
          105

          An Architecture for Inline Anomaly Detection Tammo Krueger, Christian Gehl, Konrad Rieck and Pavel Laskov ∗ Fraunhofer Institute FIRST Intelligent Data Analysis, Berlin, Germany {krutam,gehl,rieck,laskov}@first.fraunho

          Add to Reading List

          Source URL: www-rsec.cs.uni-tuebingen.de

          Language: English - Date: 2010-03-31 05:12:25
            106

            Towards Ground Truthing Observations in Gray-Box Anomaly Detection Jiang Ming Haibin Zhang and Debin Gao

            Add to Reading List

            Source URL: flyer.sis.smu.edu.sg

            Language: English - Date: 2014-12-17 01:40:50
              107Facebook / Social networking services / E-commerce / Anomaly detection / Data mining / Data security / Malware / Google Chrome / Computer security

              PDF Document

              Add to Reading List

              Source URL: www.usenix.org

              Language: English
              108Software engineering / Computing / Computer programming / Subroutines / Parameter / Argument / Scala / Anomaly detection / Function overloading / Named parameter / Anomaly / Type signature

              PDF Document

              Add to Reading List

              Source URL: mp.binaervarianz.de

              Language: English - Date: 2013-02-02 08:30:18
              109

              Journal of Machine Learning Research3724 Submitted 2/10; Revised 2/11; PublishedSecurity Analysis of Online Centroid Anomaly Detection Marius Kloft∗

              Add to Reading List

              Source URL: www-rsec.cs.uni-tuebingen.de

              Language: English - Date: 2013-05-22 13:08:22
                110

                The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim {dchantin, feldman, hopper, kyd}@cs.umn.edu University of Minnes

                Add to Reading List

                Source URL: www-users.cs.umn.edu

                Language: English - Date: 2009-07-08 16:19:20
                  UPDATE