Novelty detection: a review—part 1: statistical approaches
Signal Processing
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Outlier detection by active learning
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier detection by sampling with accuracy guarantees
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Unknown word sense detection as outlier detection
HLT-NAACL '06 Proceedings of the main conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics
IEEE Transactions on Knowledge and Data Engineering
Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
Intelligent Data Analysis
An efficient intrusion detection system using a boosting-based learning algorithm
International Journal of Computer Applications in Technology
ULISSE, a network intrusion detection system
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Network intrusion detection using genetic algorithm to find best DNA signature
WSEAS TRANSACTIONS on SYSTEMS
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
ACM Computing Surveys (CSUR)
Active and Semi-supervised Data Domain Description
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part I
Computational Statistics & Data Analysis
Neural network based fault detection and identification for fighter control surface failure
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
Intrusion detection using continuous time Bayesian networks
Journal of Artificial Intelligence Research
Anomaly detection techniques for a web defacement monitoring service
Expert Systems with Applications: An International Journal
Resource awareness in computational intelligence
International Journal of Advanced Intelligence Paradigms
An efficient parzen-window based network intrusion detector using a pattern synthesis technique
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
Analyzing TCP traffic patterns using self organizing maps
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Anomalistic sequence detection
International Journal of Intelligent Information and Database Systems
On the pattern recognition and classification of stochastically episodic events
Transactions on Compuational Collective Intelligence VI
L1 norm based KPCA for novelty detection
Pattern Recognition
Accelerated max-margin multiple kernel learning
Applied Intelligence
Novelty detection using a new group outlier factor
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part III
Novelty detection algorithm for data streams multi-class problems
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Security analysis of online centroid anomaly detection
The Journal of Machine Learning Research
Review: A review of novelty detection
Signal Processing
Hi-index | 0.00 |
We extend the triangulation method in [7] and present a tetrahedron method for the sequential mapping of points in high-dimensional space into three-space. The three-space preserves distances among nodes of a tetrahedron. Whenever a new point is mapped, ...