Sciweavers

703 search results - page 58 / 141
» Graph-based anomaly detection
Sort
View
193
Voted
RAID
1999
Springer
15 years 7 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
CCS
2008
ACM
15 years 5 months ago
Automatic feature selection for anomaly detection
Marius Kloft, Ulf Brefeld, Patrick Düssel, Ch...
119
Voted
DIMVA
2009
15 years 4 months ago
Selecting and Improving System Call Models for Anomaly Detection
Alessandro Frossi, Federico Maggi, Gian Luigi Rizz...