Sciweavers

934 search results - page 9 / 187
» Anomaly Detection Using Visualization and Machine Learning
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
PR
2011
14 years 19 days ago
Detecting and discriminating behavioural anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempo...
Chen Change Loy, Tao Xiang, Shaogang Gong
TCSV
2008
174views more  TCSV 2008»
14 years 9 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi
CCS
2007
ACM
15 years 4 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
IVS
2006
240views more  IVS 2006»
14 years 9 months ago
Business process impact visualization and anomaly detection
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...