Anomaly detection

Results: 503



#Item
81

An Anomaly Detection System based on Ensemble of Detectors with Effective Pruning Techniques Amirreza Soudi, Wael Khreich, and Abdelwahab Hamou-Lhadj Software Behaviour Analysis (SBA) Research Lab, Department of Electric

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2015-06-20 17:32:37
    82

    Histogram-based Outlier Score (HBOS): A fast Unsupervised Anomaly Detection Algorithm Markus Goldstein and Andreas Dengel German Research Center for Artificial Intelligence (DFKI), Trippstadter Str. 122, 67663 Kaiserslau

    Add to Reading List

    Source URL: www.dfki.de

    Language: English - Date: 2012-09-17 06:53:28
      83Data mining / Machine learning / Computational linguistics / Natural language processing / Anomaly detection / Data security / Link analysis / Outlier / Inference / Question answering / Supervised learning / Knowledge base

      Autonomously Reviewing and Validating the Knowledge Base of a Never-Ending Learning System Saulo D. S. Pedro Ana Paula Appel

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:46:54
      84Statistics / Information / Data mining / Robust statistics / Outlier / Statistical analysis / Local outlier factor / FADD / K-nearest neighbors algorithm / Anomaly detection / PageRank

      Fast Outlier Detection Despite the Duplicates Jay-Yoon Lee1 1 U Kang2

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:46:56
      85Statistics / Probability distributions / Time series models / Robust statistics / Statistical theory / Regression analysis / Outlier / Autoregressive model / Errors and residuals / Normal distribution / Principal component analysis / Exponential distribution

      Robust Multivariate Autoregression for Anomaly Detection in Dynamic Product Ratings Nikou Günnemann Stephan Günnemann

      Add to Reading List

      Source URL: www.cs.cmu.edu

      Language: English - Date: 2014-01-26 13:10:01
      86

      An Algorithm for Anomaly-based Botnet Detection James R. Binkley Computer Science Dept. Portland State University Portland, OR, USA

      Add to Reading List

      Source URL: web.cecs.pdx.edu

      Language: English - Date: 2006-08-17 12:52:39
        87

        Frequently Asked Questions This FAQ covers the Grok application and underlying anomaly detection technology. It includes links to other documents for detailed information. Table of Contents Anomaly Detection ............

        Add to Reading List

        Source URL: grokstream.com

        Language: English - Date: 2015-11-26 02:18:35
          88

          Pedestrian Anomaly Detection Using Context-Sensitive Crowd Simulation Cory D. Boatright Mubbasir Kapadia Jennie M. Shapira Norman I. Badler

          Add to Reading List

          Source URL: www.seas.upenn.edu

          Language: English - Date: 2012-12-14 20:12:33
            89Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

            JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

            Add to Reading List

            Source URL: www.cs.umd.edu

            Language: English - Date: 2014-03-28 12:39:15
            90

            Anomaly Detection on Whole-Brain Functional Imaging of Neuronal Activity using Graph Scan Statistics Youngser Park Heng Wang

            Add to Reading List

            Source URL: www.cis.jhu.edu

            Language: English - Date: 2015-07-19 05:57:47
              UPDATE