Sciweavers

119 search results - page 1 / 24
» NADA - Network Anomaly Detection Algorithm
Sort
View
CIKM
2011
Springer
12 years 4 months ago
Detecting anomalies in graphs with numeric labels
This paper presents Yagada, an algorithm to search labelled graphs for anomalies using both structural data and numeric attributes. Yagada is explained using several security-rela...
Michael Davis, Weiru Liu, Paul Miller, George Redp...
JMLR
2010
198views more  JMLR 2010»
12 years 11 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
NIPS
2004
13 years 5 months ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
TR
2010
204views Hardware» more  TR 2010»
12 years 11 months ago
Anomaly Detection Through a Bayesian Support Vector Machine
This paper investigates the use of a one-class support vector machine algorithm to detect the onset of system anomalies, and trend output classification probabilities, as a way to ...
Vasilis A. Sotiris, Peter W. Tse, Michael Pecht
ISMIS
2005
Springer
13 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...