Anomaly detection

Results: 503



#Item
71

Toward an End-to-end Framework for Modeling, Monitoring and Anomaly Detection for Scientific Workflows Anirban Mandal, Paul Ruth, Ilya Baldin RENCI - UNC Chapel Hill {anirban,pruth,ibaldin}@renci.org Jeremy Meredith, Jef

Add to Reading List

Source URL: www.es.net

Language: English - Date: 2016-05-05 09:41:39
    72Algebra / Mathematics / Multivariate statistics / Principal component analysis / Intrusion detection system / Eigenvalues and eigenvectors / Anomaly detection / Anomaly / Dimensionality reduction

    In-Network PCA and Anomaly Detection Ling Huang UC Berkeley XuanLong Nguyen

    Add to Reading List

    Source URL: dept.stat.lsa.umich.edu

    Language: English - Date: 2006-11-07 02:47:35
    73Deep learning / Data mining / Numenta / Anomaly detection / Jeff Hawkins / Anomaly / Benchmark / On Intelligence

    Benchmark |Numenta Anomaly Benchmark| Numenta Anomaly Benchmark   The First Temporal Benchmark Designed to Evaluate

    Add to Reading List

    Source URL: numenta.com

    Language: English - Date: 2015-11-09 23:23:27
    74Statistics / Dynamic programming / Machine learning / Mathematics / Data mining / Search algorithms / Anomaly detection / Data security / K-nearest neighbors algorithm / Algorithm / Dynamic time warping / Self-organizing map

    MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Exemplar Learning for Extremely Efficient Anomaly Detection in Real-Valued Time Series Jones, M.J.; Nikovski, D.N.; Imamura, M.; Hirata, T.

    Add to Reading List

    Source URL: www.merl.com

    Language: English - Date: 2016-04-13 11:46:43
    75

        The  Science  of  Anomaly  Detection How  HTM  Enables  Anomaly  Detection  in  Streaming  Data  

    Add to Reading List

    Source URL: numenta.com

    Language: English - Date: 2015-11-09 23:23:27
      76Abnormal psychology / ImageNet / Normality / Abnormality / Category / Anomaly detection / Behavior / Philosophy / Behavioural sciences

      Toward a Taxonomy and Computational Models of Abnormalities in Images Ahmed Elgammal Dept. of Computer Science Rutgers University New Jersey , USA

      Add to Reading List

      Source URL: ai2-website.s3.amazonaws.com

      Language: English - Date: 2016-05-10 13:04:52
      77

      Techniques for Anomaly Detection in IPv4 and IPv6 Network Flows Author: Grace M. Rodriguez Gomez - University of Puerto Rico - Rio Piedras Campus Mentor: Humberto Ortiz-Zuazaga -

      Add to Reading List

      Source URL: cahsi.cs.utep.edu

      Language: English - Date: 2015-09-16 12:18:12
        78Computer security / Computer network security / Sqrrl / Threat / Data security / Apache Accumulo / Analytics / Anomaly detection / User behavior analytics / Cyber threat hunting

        DATASHEET SQRRL ENTERPRISE USE CASE: USER AND ENTITY BEHAVIOR ANALYTICS (UEBA) Find Deeper Meaning by Cutting Through the Noise

        Add to Reading List

        Source URL: sqrrl.com

        Language: English - Date: 2016-04-01 17:08:54
        79

        Automated Anomaly Detection Within The Toa Network Flow Data Monitoring System José Alfredo Valles, Dr. José Ortiz-Ubarri Department of Computer Science, University of Puerto Rico-Río Piedras Campus, San Juan, Puerto

        Add to Reading List

        Source URL: cahsi.cs.utep.edu

        Language: English - Date: 2015-09-16 12:16:56
          80

          Techniques for Anomaly Detection in Network Flows Bianca I. Colón-Rosado, Humberto Ortiz-Zuazaga University of Puerto Rico - Río Piedras Campus Computer Science Department Abstract

          Add to Reading List

          Source URL: cahsi.cs.utep.edu

          Language: English - Date: 2015-09-16 12:18:05
            UPDATE