Rule-based anomaly pattern detection for detecting disease outbreaks
Eighteenth national conference on Artificial intelligence
Detecting errors within a corpus using anomaly detection
NAACL 2000 Proceedings of the 1st North American chapter of the Association for Computational Linguistics conference
Coordinated internet attacks: responding to attack complexity
Journal of Computer Security
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Feature bagging for outlier detection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Unsupervised anomaly detection in network intrusion detection using clusters
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
A clustering-based method for unsupervised intrusion detections
Pattern Recognition Letters
Behavior-based modeling and its application to Email analysis
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 4th ACM workshop on Recurring malcode
The Journal of Machine Learning Research
Anomaly detection in TCP/IP networks using immune systems paradigm
Computer Communications
Adaptive anomaly detection with evolving connectionist systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
Journal of Computer Security
IEEE Transactions on Knowledge and Data Engineering
Network anomaly detection with incomplete audit data
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting anomalous records in categorical datasets
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Finding tribes: identifying close-knit individuals from employment patterns
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
A Tabu Clustering algorithm for Intrusion Detection
Intelligent Data Analysis
Anomaly pattern detection in categorical datasets
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier Detection with Kernel Density Functions
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Detecting Current Outliers: Continuous Outlier Detection over Time-Series Data Streams
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Automatic discovery of botnet communities on large-scale communication networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
ACM Computing Surveys (CSUR)
BotCop: An Online Botnet Traffic Classifier
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
When gossip is good: distributed probabilistic inference for detection of slow network intrusions
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
The research of NIDS based on improved GA
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Detecting malicious software by monitoring anomalous windows registry accesses
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
A risk-sensitive intrusion detection model
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
MLMI'07 Proceedings of the 4th international conference on Machine learning for multimodal interaction
A general framework to detect unsafe system states from multisensor data stream
IEEE Transactions on Intelligent Transportation Systems
Conformal prediction for distribution-independent anomaly detection in streaming vessel data
Proceedings of the First International Workshop on Novel Data Stream Pattern Mining Techniques
On community outliers and their efficient detection in information networks
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
DBOD-DS: distance based outlier detection for data
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part I
Community epidemic detection using time-correlated anomalies
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
An interactive approach to outlier detection
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
Clustering botnet communication traffic based on n-gram feature selection
Computer Communications
Incremental SVM based on reserved set for network intrusion detection
Expert Systems with Applications: An International Journal
Intrusion detection using continuous time Bayesian networks
Journal of Artificial Intelligence Research
Active learning and subspace clustering for anomaly detection
Intelligent Data Analysis
Improved realtime intrusion detection system
ICONIP'06 Proceedings of the 13th international conference on Neural information processing - Volume Part III
Spatiotemporal Models for Data-Anomaly Detection in Dynamic Environmental Monitoring Campaigns
ACM Transactions on Sensor Networks (TOSN)
Anomaly intrusion detection based upon an artificial immunity model
Proceedings of the 49th Annual Southeast Regional Conference
Improved kernel based intrusion detection system
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
An approach based on wavelet analysis and non-linear mapping to detect anomalies in dataset
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
FADS: a fuzzy anomaly detection system
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
Machine learning approach to realtime intrusion detection system
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
A new unsupervised anomaly detection framework for detecting network attacks in real-time
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Two-tier based intrusion detection system
FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II
Supporting a real-time distributed intrusion detection application on GATES
Euro-Par'06 Proceedings of the 12th international conference on Parallel Processing
Signature-Based approach for intrusion detection
MLDM'05 Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition
Anomaly detection in computer security and an application to file system accesses
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
A multiple agents based intrusion detection system
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Unsupervised anomaly detection based n an evolutionary artificial immune network
EC'05 Proceedings of the 3rd European conference on Applications of Evolutionary Computing
A genetic SOM clustering algorithm for intrusion detection
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Self-adaptive and dynamic clustering for online anomaly detection
Expert Systems with Applications: An International Journal
Event-based classification of social media streams
Proceedings of the 2nd ACM International Conference on Multimedia Retrieval
Integrating community matching and outlier detection for mining evolutionary community outliers
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
A survey of anomaly intrusion detection techniques
Journal of Computing Sciences in Colleges
Continuous kernel-based outlier detection over distributed data streams
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Continuous adaptive outlier detection on distributed data streams
HPCC'07 Proceedings of the Third international conference on High Performance Computing and Communications
A possibilistic approach to intrusion detection under imperfect logging protocol
Proceedings of the 6th International Conference on Security of Information and Networks
On detection of emerging anomalous traffic patterns using GPS data
Data & Knowledge Engineering
Situational awareness through reasoning on network incidents
Proceedings of the 4th ACM conference on Data and application security and privacy
Multi-task learning with one-class SVM
Neurocomputing
Research issues in outlier detection for data streams
ACM SIGKDD Explorations Newsletter
Hi-index | 0.00 |