Anomaly Detection at Multiple Scales

Results: 4



#Item
1Data security / Computer security / Data mining / DARPA / Georgia Tech Research Institute / Anomaly detection / Anomaly Detection at Multiple Scales / Anomaly / Outlier / Benchmark / Synthetic data

SYSTEMATIC CONSTRUCTION OF ANOMALY DETECTION BENCHMARKS FROM REAL DATA Outlier Detection And Description Workshop 2013

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-09-06 10:43:41
2Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-03-28 12:39:15
3Cyberwarfare / Threat / Federal Bureau of Investigation / Industrial espionage / Cyber Insider Threat / Anomaly Detection at Multiple Scales / Computer network security / Computer security / Security

FEDERAL BUREAU OF INVESTIGATION “Fidelity, Bravery, and Integrity” Combating the Insider Threat at the FBI: Real World Lessons Learned Patrick Reidy

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 04:36:09
4Science / Behavior / Computer security / Data security / Georgia Tech Research Institute / Anomaly detection / Anomaly Detection at Multiple Scales / Psychology / Social psychology / Statistics / Data mining / Behavioural sciences

Proactive Insider Threat Detection through Graph Learning and Psychological Context Oliver Brdiczka, Juan Liu, Bob Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut Palo Alto Research Cen

Add to Reading List

Source URL: www.parc.com

Language: English - Date: 2012-05-07 15:44:41
UPDATE