Sciweavers

KES
2007
Springer
13 years 10 months ago
Time Discretisation Applied to Anomaly Detection in a Marine Engine
This paper introduces the problems associated with anomaly detection in a marine engine, and explains the benefits that the SAX representation brings to the field. Despite limita...
Ian Morgan, Honghai Liu, George Turnbull, David J....
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
13 years 10 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
CCS
2007
ACM
13 years 10 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
AIMS
2007
Springer
13 years 10 months ago
Improving Anomaly Detection Event Analysis Using the EventRank Algorithm
Abstract. We discuss an approach to reducing the number of events accepted by anomaly detection systems, based on alternative schemes for interest-ranking. The basic assumption is ...
Kyrre M. Begnum, Mark Burgess
ICC
2007
IEEE
147views Communications» more  ICC 2007»
13 years 11 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
13 years 11 months ago
Analysis of Payload Based Application level Network Anomaly Detection
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Like Zhang, Gregory B. White
SECURWARE
2008
IEEE
13 years 11 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
13 years 11 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
ICCCN
2008
IEEE
13 years 11 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
IAT
2008
IEEE
13 years 11 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...