Anomaly detection

Results: 503



#Item
41Statistics / Information / Data / Data mining / Robust statistics / Outlier / Statistical data / Formal sciences / Ensemble learning / K-nearest neighbors algorithm / Local outlier factor / Anomaly detection

Charu C. Aggarwal IBM T J Watson Research Center Yorktown, NYOutlier Ensembles

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-08-13 03:47:38
42Wireless sensor network / Wireless networking / Computing / Sensor node / Technology / Data transmission / Anomaly detection

Visualizing Anomalies in Sensor Networks Qi Liao∗ , Lei Shi† , Yuan He‡ , Rui Li§ , Zhong Su† , Aaron Striegel∗ , Yunhao Liu ∗ University of Notre Dame, USA. E-mail: {qliao,striegel}@nd.edu. † IBM Researc

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:53:42
43Information technology management / Data analysis / Scientific method / Anomaly detection / Computer-aided audit tools / Information technology / Computing

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ridgetopgroup.com

Language: English - Date: 2015-11-09 19:14:46
44Computing / Knowledge / Information / Error / Data quality / Data / Error detection and correction / Data cleansing / Statistics / Type I and type II errors / Anomaly detection / Code

arXiv:1602.07807v2 [cs.DB] 11 AprData Cleaning for XML Electronic Dictionaries via Statistical Anomaly Detection Michael Bloodgood

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-04-11 20:45:58
45Computing / Data security / Anomaly detection / Data mining / Computer programming / Cloud computing / Cloud storage / Tracing / Data lineage / CELAR

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:36:52
46Statistics / Statistical classification / Data / Anomaly detection / Data mining / Data security / Machine learning / Support vector machine / Outlier / Decision boundary / Artificial neural network

Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer1, Markus Goldstein2, Slim Abdennadher1 1 2

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-08-13 15:59:38
47Algebra / Mathematics / Statistics / Linear algebra / Multivariate statistics / Matrix theory / Data mining / Functional analysis / Non-negative matrix factorization / Outlier / Principal component analysis / Anomaly detection

Latent Outlier Detection and the Low Precision Problem Fei Wang Sanjay Chawla Didi Surian

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-07-04 03:56:20
48Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server

Anomaly detection from server log data. A case study

Add to Reading List

Source URL: www.vtt.fi

Language: English - Date: 2015-03-18 09:57:49
49Data mining / Computing / Wireless sensor network / Cluster analysis / Geostatistics / Anomaly detection / Information / Data / Sensor node / Anomaly / Connectivity

Root Cause Detection in a Service-Oriented Architecture ∗ Myunghwan Kim Stanford University

Add to Reading List

Source URL: i.stanford.edu

Language: English - Date: 2013-08-25 23:54:25
50File sharing networks / File sharing / Software / Cross-platform software / Computing / Analytic geometry / Coordinate system / Peer-to-peer / Node / GiFT

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim {dchantin, feldman, hopper, kyd}@cs.umn.edu University of Minnes

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
UPDATE