We face the problem of novelty detection from stream data, that is, the identification of new or unknown situations in an ordered sequence of objects which arrive on-line, at cons...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
In this paper we present a new scheme for detection and tracking of specific objects in a knowledge-based framework. The scheme uses a supervised learning method: Support Vector M...
Lionel Carminati, Jenny Benois-Pineau, Christian J...
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Principal component analyses (PCA) has been widely used in reduction of the dimensionality of datasets, classification, feature extraction, etc. It has been combined with many oth...