Sciweavers

69 search results - page 4 / 14
» Anomaly Detection and its Application in Grid
Sort
View
JMLR
2010
198views more  JMLR 2010»
13 years 1 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
NOMS
2008
IEEE
175views Communications» more  NOMS 2008»
14 years 20 days ago
Analysis of application performance and its change via representative application signatures
Abstract—Application servers are a core component of a multitier architecture that has become the industry standard for building scalable client-server applications. A client com...
Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat,...
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
14 years 18 days ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
13 years 7 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 1 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson