Anomaly detection

Results: 503



#Item
31

Big Graph Mining: Algorithms, Anomaly Detection, and Applications U Kang Leman Akoglu

Add to Reading List

Source URL: www3.cs.stonybrook.edu

- Date: 2013-06-08 15:50:22
    32

    Anomaly Detection: A Unique Anti-Fraud Approach GET CONNECTED TODAY BidSwitch™ is available for immediate access to any programmatic enabled demand or supply

    Add to Reading List

    Source URL: www.bidswitch.com

    - Date: 2015-07-15 17:18:29
      33

      An Incremental Learner for Language-Based Anomaly Detection in XML Harald Lampesberger Department of Secure Information Systems University of Applied Sciences Upper Austria Email:

      Add to Reading List

      Source URL: spw16.langsec.org

      - Date: 2016-06-05 23:38:40
        34

        Frequently Asked Questions Demystifying the Grok platform. This FAQ covers the Grok application and underlying anomaly detection technology. It includes links to other documents for detailed information.

        Add to Reading List

        Source URL: grokstream.com

        - Date: 2016-07-15 04:30:09
          35

          Systematic Construction of Anomaly Detection Benchmarks from Real Data Andrew F. Emmott, Shubhomoy Das, Thomas Dietterich, Alan Fern, Weng-Keen Wong Oregon State University School of EECS Corvallis, Oregon, USA

          Add to Reading List

          Source URL: www.outlier-analytics.org

          - Date: 2013-07-04 03:56:12
            36

            Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer Markus Goldstein

            Add to Reading List

            Source URL: www.outlier-analytics.org

            - Date: 2013-07-04 03:56:10
              37

              DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection Maciej Korczy´nski∗ , Ali Hamieh∗ , Jun Ho Huh§ , Henrik Holm† , S. Raj Rajagopalan§ , and Nina H. Fefferman∗ ∗ †

              Add to Reading List

              Source URL: mkorczynski.com

              - Date: 2015-05-07 17:16:56
                38Statistics / Dimension reduction / Data mining / Multivariate statistics / Robust statistics / Machine learning / Outlier / Local outlier factor / Anomaly detection / Principal component analysis / Random sample consensus / Dimensionality reduction

                Knowl Inf Syst DOIs10115REGULAR PAPER Density-preserving projections for large-scale local anomaly detection

                Add to Reading List

                Source URL: pmg.it.usyd.edu.au

                Language: English - Date: 2011-10-04 00:04:53
                39Computing / Software / World Wide Web / Social networking services / Social media / Microblogging / Real-time web / Social networks / Thread / Anomaly detection / Twitter / Conversation threading

                018-20tvcg12-zhaoindd

                Add to Reading List

                Source URL: vialab.science.uoit.ca

                Language: English - Date: 2015-09-22 16:31:59
                40Computing / Data mining / Anomaly detection / Data security / Data / Cloud computing / NetCDF / Anomaly / Data analysis

                Improving Oceanographic Anomaly Detection Using High Performance Computing Thomas Huang, Ed Armstrong, George Chang, Toshio Chin, Brian Wilson, Tong (Tony) Lee, Victor Zlotnicki. Jorge Vazquez and Michelle Gierach Jet Pr

                Add to Reading List

                Source URL: sccoos.org

                Language: English - Date: 2015-05-13 15:32:26
                UPDATE