|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1254 occurrences of 806 keywords
|
|
|
Results
Found 3378 publication records. Showing 3378 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
62 | Fevzi Belli, Thomas Illgen |
Logic Representation of Programs to Detect Arithmetic Anomalies. |
EUROMICRO |
2000 |
DBLP DOI BibTeX RDF |
Arithmetic Anomalies, Software Legacy and Re-engineering, Logic Programming, Program Transformation, Program Testing |
59 | Alfs T. Berztiss |
Usage Anomalies and Internationalization. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
usage anomalies, successful communication, international setting, cultural backgrounds, linguistic background, syntax anomalies, cultural context, linguistic misinterpretation, linguistics, cultural differences, internationalization, context switch, spelling |
58 | Chong Hua Fam, Eun-Jung Holden, Michael Dentith, Peter Kovesi |
Towards the Automated Mapping of Linear Anomalies within Aeromagnetic Datasets. |
DICTA |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Mining anomalies using traffic feature distributions. |
SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
anomaly classification, network-wide traffic analysis, anomaly detection |
58 | Ingomar Wenzel, Raimund Kirner, Peter P. Puschner, Bernhard Rieder |
Principles of Timing Anomalies in Superscalar Processors. |
QSIC |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Wei Fan 0001, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan |
Using artificial anomalies to detect unknown and known network intrusions. |
Knowl. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Artificial anomaly, Security, Intrusion detection, Anomaly detection |
58 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Diagnosing network-wide traffic anomalies. |
SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, network traffic analysis |
58 | Paul Barford, Jeffery Kline, David Plonka, Amos Ron |
A signal analysis of network traffic anomalies. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
58 | Gunter Grieser, Steffen Lange, Thomas Zeugmann |
Learning Recursive Concepts with Anomalies. |
ALT |
2000 |
DBLP DOI BibTeX RDF |
|
55 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
Misconfigurations discovery between distributed security components using the mobile agent approach. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations |
54 | Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka |
Detecting and Identifying Network Anomalies by Component Analysis. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
Network anomalies, Anomaly identification, Principal component analysis, Anomaly detection, Traffic analysis |
50 | Carla Dionisi, Francesca Mariani, Maria Cristina Recchioni, Francesco Zirilli |
Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
power transmission network, cascading blackout, mathematical programming, stochastic optimization |
50 | William Eberle, Lawrence B. Holder |
Discovering Structural Anomalies in Graph-Based Data. |
ICDM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot |
Detectability of Traffic Anomalies in Two Adjacent Networks. |
PAM |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Robyn R. Lutz, Ines Carmen Mikulski |
Empirical Analysis of Safety-Critical Anomalies During Operations. |
IEEE Trans. Software Eng. |
2004 |
DBLP DOI BibTeX RDF |
Software and system safety, diagnostics, product metrics, maintenance process |
50 | Anukool Lakhina, Mark Crovella, Christophe Diot |
Characterization of network-wide anomalies in traffic flows. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, network traffic analysis |
50 | Hou Zunze |
Wavelet Transform and Its Application to Decomposition of Gravity Anomalies. |
WAA |
2001 |
DBLP DOI BibTeX RDF |
|
50 | Thomas Lundqvist, Per Stenström |
Timing Anomalies in Dynamically Scheduled Microprocessors. |
RTSS |
1999 |
DBLP DOI BibTeX RDF |
timing anomaly, Real-time systems, resource allocation, timing analysis, worst-case execution time, out-of-order execution, dynamically scheduled processor |
47 | Dragos D. Margineantu, Stephen Bay, Philip Chan 0001, Terran Lane |
Data mining methods for anomaly detection KDD-2005 workshop report. |
SIGKDD Explor. |
2005 |
DBLP DOI BibTeX RDF |
detection of anomalies in data, data mining, machine learning, anomalies |
47 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
A secure mobile agents approach for anomalies detection on firewalls. |
iiWAS |
2008 |
DBLP DOI BibTeX RDF |
trust agent, mobile agent, anomalies detection, firewalls |
47 | Yan Guo, Lishan Kang, Fujiang Liu, Linlu Mei |
A New Evolutionary Neural Network and Its Application for the Extraction of Vegetation Anomalies. |
ISICA |
2007 |
DBLP DOI BibTeX RDF |
vegetation anomalies, evolutionary algorithms, remote sensing, extraction, Evolutionary neural networks, BP algorithm |
47 | Wolfgang John, Sven Tafvelin |
Analysis of internet backbone traffic and header anomalies observed. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
header anomalies, traffic analysis, internet measurement |
46 | Kaustav Das, Jeff G. Schneider |
Detecting anomalous records in categorical datasets. |
KDD |
2007 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
43 | Uli Alexander Bornhauser, Peter Martini |
A Divergence Analysis in Autonomous Systems Using Full-Mesh iBGP. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Routing Anomalies, Networks, Border Gateway Protocol, Functional Analysis, Communication System Routing |
43 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
NIDSs, Policy Anomalies, Network Security, Firewalls |
43 | Rajesh R. Talpade, Gitae Kim, Sumit Khurana |
NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
network performance monitoring, network anomalies, packet delay variance, traffic analysis, flow, time to live (TTL) |
42 | Seong Soo Kim, A. L. Narasimha Reddy |
Statistical techniques for detecting traffic anomalies through packet header data. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
egress filtering, packet header, real-time network anomaly detection, statistical analysis of network traffic, time series of address correlation, wavelet-based transform, network attack |
42 | Haibin Cheng, Pang-Ning Tan, Christopher Potter, Steven A. Klooster |
A Robust Graph-Based Algorithm for Detection and Characterization of Anomalies in Noisy Multivariate Time Series. |
ICDM Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
visualization, routing, network security, BGP |
42 | Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina |
Detection and identification of network anomalies using sketch subspaces. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
defeat, anomaly detection, sketch, subspace method |
42 | Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci |
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman |
Combining routing and traffic data for detection of IP forwarding anomalies. |
SIGMETRICS |
2004 |
DBLP DOI BibTeX RDF |
routing, BGP, SNMP, traffic, network anomaly detection |
39 | Luciano Caroprese, Peter M. A. Sloot, Breanndán Ó Nualláin, Ester Zumpano |
A logical framework for detecting anomalies in drug resistance algorithms. |
IDEAS |
2009 |
DBLP DOI BibTeX RDF |
anomalies in drug resistance algorithms, bio-medical databases, logic programming, decision support system, knowledge discovery, rule-base system |
39 | B. Aditya Prakash, Nicholas Valler, David G. Andersen, Michalis Faloutsos, Christos Faloutsos |
BGP-lens: patterns and anomalies in internet routing updates. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
BGP monitoring, patterns, self-similarity, anomalies |
39 | Andrzej Wasylkowski, Andreas Zeller, Christian Lindig |
Detecting object usage anomalies. |
ESEC/SIGSOFT FSE |
2007 |
DBLP DOI BibTeX RDF |
automated defect detection, automated specification generation, data mining for software engineering, object usage anomalies, programming rules, pattern recognition, static analysis |
39 | Ioannis Ch. Paschalidis, Georgios Smaragdakis |
Spatio-temporal network anomaly detection by assessing deviations of empirical measures. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
method of types, statistical anomaly detection, network security, Markov processes, large deviations |
39 | Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi |
Implementation considerations for improving data integrity in normalized relational databases. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
data integrity functional independency, decomposition, normalization, functional dependency |
39 | Pavan Vatturi, Weng-Keen Wong |
Category detection using hierarchical mean shift. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
category detection, clustering, anomaly detection, mean shift |
39 | Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata, Ryohei Fujimaki |
Network anomaly detection based on Eigen equation compression. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
Eigen equation compression, network anomaly detection |
39 | Pham Van Dung, Marat Zhanikeev, Yoshiaki Tanaka |
Traffic Trace Engineering. |
APNOMS |
2009 |
DBLP DOI BibTeX RDF |
Simulation, Analysis, Emulation, Trace, Traffic, Replay, Anomaly |
39 | Kaustav Das, Jeff G. Schneider, Daniel B. Neill |
Anomaly pattern detection in categorical datasets. |
KDD |
2008 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection, pattern detection |
39 | Karim Tabia, Salem Benferhat, Yassine Djouadi |
A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Lingyun Yang, Chuang Liu 0006, Jennifer M. Schopf, Ian T. Foster |
Anomaly detection and diagnosis in grid environments. |
SC |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun |
Traffic Anomaly Detection and Characterization in the Tunisian National University Network. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
Temporal Characteristics, Principal Component Analysis, Anomaly Detection |
35 | Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens |
Complete analysis of configuration rules to guarantee reliable network security policies. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Policy anomalies, Network security, Intrusion Detection systems, Firewalls |
35 | Jens Knoop, Eduard Mehofer |
Interprocedural Distribution Assignment Placement: More than Just Enhancing Intraprocedural Placing Techniques. |
IEEE PACT |
1997 |
DBLP DOI BibTeX RDF |
interprocedural distribution assignment placement, intraprocedural placing techniques, unnecessary run-time remappings, partially redundant distribution assignment elimination, partially dead distribution assignment elimination, algorithm hierarchy, user-customized solutions, dynamic data redistribution, optimization, parallel programming, High Performance Fortran, anomalies, distributed-memory architectures, data-parallel programs, interprocedural data-flow analysis, run-time efficiency |
35 | Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan |
ASTUTE: detecting a different class of traffic anomalies. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
anomaly detection, statistical test |
35 | James M. Kang, Shashi Shekhar, Michael Henjum, Paige J. Novak, William A. Arnold |
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach. |
SSTD |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Jianning Mai, Lihua Yuan, Chen-Nee Chuah |
Detecting BGP anomalies with wavelet. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Karim Dhambri, Houari A. Sahraoui, Pierre Poulin |
Visual Detection of Design Anomalies. |
CSMR |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Osamu Akashi, Atsushi Terauchi |
Diagnosis of IP-Service Anomalies Based on BGP-Update Temporal Analysis. |
IPOM |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Hong Wang, Zhenghu Gong, Qing Guan, Baosheng Wang |
Detection Network Anomalies Based on Packet and Flow Analysis. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
multistage filter, anomaly detection, flow analysis |
35 | Karim Pichara, Alvaro Soto, Anita Araneda |
Detection of Anomalies in Large Datasets Using an Active Learning Scheme Based on Dirichlet Distributions. |
IBERAMIA |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano |
A Study on Detecting Network Anomalies Using Sampled Flow Statistics. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Grzegorz Kolaczek |
Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Du Zhang |
Fixpoint semantics for rule-base anomalies. |
IEEE ICCI |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Kai Hwang 0001, Ying Chen, Hua Liu |
Defending Distributed Systems Against Malicious Intrusions and Network Anomalies. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Mehmet Aksit, Jan Bosch, William van der Sterren, Lodewijk Bergmans |
Real-Time Specification Inheritance Anomalies and Real-Time Filters. |
ECOOP |
1994 |
DBLP DOI BibTeX RDF |
|
35 | Catriel Beeri, Michael Kifer |
A theory of intersection anomalies in relational database schemes. |
J. ACM |
1987 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
An inference system for detecting firewall filtering rules anomalies. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
filtering rules, anomalies detection, firewall, inference system |
31 | Xiaohui Gu, Haixun Wang |
Online Anomaly Prediction for Robust Cluster Systems. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Hanghang Tong, Yasushi Sakurai, Tina Eliassi-Rad, Christos Faloutsos |
Fast mining of complex time-stamped events. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
scalability, graph mining, multi-resolution analysis |
31 | Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella |
Distributed Spatial Anomaly Detection. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, Sanjay Ranka |
Conditional Anomaly Detection. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
Data mining, mining methods and algorithms |
31 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
31 | Wenwei Li, Dafang Zhang, Jinmin Yang, Gaogang Xie, Lei Wang |
A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Alan D. Fekete, Dimitrios Liarokapis, Elizabeth J. O'Neil, Patrick E. O'Neil, Dennis E. Shasha |
Making snapshot isolation serializable. |
ACM Trans. Database Syst. |
2005 |
DBLP DOI BibTeX RDF |
multiversion concurrency, weak isolation, Concurrency control, consistency, serializability, anomaly, snapshot isolation |
31 | Alexandre Bergel, Stéphane Ducasse, Oscar Nierstrasz |
Classbox/J: controlling the scope of change in Java. |
OOPSLA |
2005 |
DBLP DOI BibTeX RDF |
class extension, open-classes, module, package |
31 | John Case, Keh-Jiann Chen, Sanjay Jain 0001 |
Costs of General Purpose Learning. |
STACS |
1999 |
DBLP DOI BibTeX RDF |
|
31 | Karl R. P. H. Leung, Daniel Kim Chung Chan |
Extending Statecharts with Duration. |
COMPSAC |
1996 |
DBLP DOI BibTeX RDF |
|
31 | Kenji Taguchi 0001, Keijiro Araki |
Extending Z with State Transition Constraints. |
COMPSAC |
1996 |
DBLP DOI BibTeX RDF |
|
31 | Anne Dinning, Edith Schonberg |
An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection. |
PPoPP |
1990 |
DBLP DOI BibTeX RDF |
FORTRAN |
27 | Giorgio C. Buttazzo |
Achieving Scalability in Real-Time Systems. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Elastic task model, Scheduling anomalies, Embedded systems, Dynamic voltage scaling, Real-time applications |
27 | Ananth Grama, Vipin Kumar 0001 |
State of the Art in Parallel Search Techniques for Discrete Optimization Problems. |
IEEE Trans. Knowl. Data Eng. |
1999 |
DBLP DOI BibTeX RDF |
game-tree search, speedup anomalies, load balancing, Parallel processing, heuristic search, backtracking, tree search, discrete optimization |
27 | Madalene Spezialetti, Rajiv Gupta 0001 |
Loop Monotonic Statements. |
IEEE Trans. Software Eng. |
1995 |
DBLP DOI BibTeX RDF |
Access anomalies (data races), run-time dependence checking, static analysis, array bound checking, induction variables |
27 | Robert A. Ballance, Susan L. Graham, Michael L. Van de Vanter |
The Pan Language-Based Editing System. |
ACM Trans. Softw. Eng. Methodol. |
1992 |
DBLP DOI BibTeX RDF |
Ladle, coherent user interfaces, colander, contextual constraint, extension facilities, grammatical abstraction, interactive programming environment, logical constraint grammar, reason maintenance, syntax-recognizing editor, tolerance for errors and anomalies, logic programming, Pan |
27 | Maurice Herlihy, Jeannette M. Wing |
Specifying Graceful Degradation. |
IEEE Trans. Parallel Distributed Syst. |
1991 |
DBLP DOI BibTeX RDF |
graceful degradation specification, relaxation lattice method, large class of programs, site crashes, timing anomalies, synchronization conflicts, formal specification, fault tolerant computing, network partitions, security breaches |
27 | Yaxin Bi, Shengli Wu 0001, Pan Xiong, Xuhui Shen |
A Comparative Analysis for Detecting Seismic Anomalies in Data Sequences of Outgoing Longwave Radiation. |
KSEM |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Hwai-Jung Hsu, Feng-Jian Wang |
Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Florian Jäger, Joachim Hornegger, Siegfried Schwab, Rolf Janka |
Computer-Aided Assessment of Anomalies in the Scoliotic Spine in 3-D MRI Images. |
MICCAI (1) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Kivanc M. Ozonat |
An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Zheng Liu 0001, Jeffrey Xu Yu, Lei Chen 0002, Di Wu 0008 |
Detection of Shape Anomalies: A Probabilistic Approach Using Hidden Markov Models. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro |
Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Sara Hakami, Zainab R. Zaidi, Björn Landfeldt, Tim Moors |
Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA). |
ISPAN |
2008 |
DBLP DOI BibTeX RDF |
Principal component analysis, Anomaly detection, Wireless mesh networks |
27 | Deepak Agarwal |
Detecting anomalies in cross-classified streams: a Bayesian approach. |
Knowl. Inf. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Multiple testing, Hierarchical Bayesian, Active learning, Multidimensional |
27 | Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry |
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack |
27 | Mohammed Anis Benelbahri, Adel Bouhoula |
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan |
A neuro-immune model for discriminating and visualizing anomalies. |
Nat. Comput. |
2006 |
DBLP DOI BibTeX RDF |
anomaly visualization, neural networks, self-organizing maps, anomaly detection, artificial immune systems, negative selection, dynamic learning |
27 | Luís Almeida 0001, Paulo Pedreiras, Ricardo Marau |
Traffic Scheduling Anomalies in Temporal Partitions. |
DIPES |
2006 |
DBLP DOI BibTeX RDF |
real-time systems, real-time scheduling, real-time communication, distributed real-time systems |
27 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Analysis of Policy Anomalies on Distributed Network Security Setups. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, Renata Teixeira |
Avoiding traceroute anomalies with Paris traceroute. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
load balancing, traceroute |
27 | Kyrre M. Begnum, Mark Burgess |
Principle Components and Importance Ranking of Distributed Anomalies. |
Mach. Learn. |
2005 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
27 | Zonghua Zhang, Hong Shen 0001 |
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Deepak K. Agarwal |
An Empirical Bayes Approach to Detect Anomalies in Dynamic Multidimensional Arrays. |
ICDM |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Fabio A. González 0001, Juan Carlos Galeano, Diego Alexander Rojas, Angélica Veloza-Suan |
Discriminating and visualizing anomalies using negative selection and self-organizing maps. |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
anomaly visualization, self-organizing maps, anomaly detection, artificial immune systems, negative selection |
27 | Jingwei Wu, Richard C. Holt |
Resolving Linkage Anomalies in Extracted Software System Models. |
IWPC |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Yi-an Huang, Wei Fan 0001, Wenke Lee, Philip S. Yu |
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Ning Jiang, Kien A. Hua, Simon Sheu |
Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection. |
ICDM |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3378 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|