Sciweavers

934 search results - page 13 / 187
» Anomaly Detection Using Visualization and Machine Learning
Sort
View
ISSTA
2010
ACM
15 years 1 months ago
Learning from 6, 000 projects: lightweight cross-project anomaly detection
Real production code contains lots of knowledge—on the domain, on the architecture, and on the environment. How can we leverage this knowledge in new projects? Using a novel lig...
Natalie Gruska, Andrzej Wasylkowski, Andreas Zelle...
71
Voted
ICIAP
2005
ACM
15 years 10 months ago
Learning Intrusion Detection: Supervised or Unsupervised?
Abstract. Application and development of specialized machine learning techniques is gaining increasing attention in the intrusion detection community. A variety of learning techniq...
Pavel Laskov, Patrick Düssel, Christin Sch&au...
DISCEX
2003
IEEE
15 years 3 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
KDD
2009
ACM
347views Data Mining» more  KDD 2009»
15 years 10 months ago
Network anomaly detection based on Eigen equation compression
This paper addresses the issue of unsupervised network anomaly detection. In recent years, networks have played more and more critical roles. Since their outages cause serious eco...
Shunsuke Hirose, Kenji Yamanishi, Takayuki Nakata,...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li