Sciweavers

357 search results - page 3 / 72
» Anomaly Detection Using Process Mining
Sort
View
OSDI
2008
ACM
14 years 5 months ago
Mining Console Logs for Large-Scale System Problem Detection
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiq...
Wei Xu, Ling Huang, Armando Fox, David A. Patterso...
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 6 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
13 years 3 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...
PKDD
2010
Springer
141views Data Mining» more  PKDD 2010»
13 years 3 months ago
On Detecting Clustered Anomalies Using SCiForest
Detecting local clustered anomalies is an intricate problem for many existing anomaly detection methods. Distance-based and density-based methods are inherently restricted by their...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
ICEIS
2008
IEEE
13 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya