Sciweavers

119 search results - page 4 / 24
» NADA - Network Anomaly Detection Algorithm
Sort
View
101
Voted
ACSAC
2000
IEEE
15 years 5 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
86
Voted
SAC
2008
ACM
15 years 18 days ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
103
Voted
ICARIS
2005
Springer
15 years 6 months ago
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
Julie Greensmith, Uwe Aickelin, Steve Cayzer
80
Voted
IDEAS
2009
IEEE
108views Database» more  IDEAS 2009»
15 years 7 months ago
A logical framework for detecting anomalies in drug resistance algorithms
Luciano Caroprese, Peter M. A. Sloot, Breannd&aacu...
108
Voted
CIDM
2009
IEEE
15 years 8 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder