Sciweavers

401 search results - page 48 / 81
» Prototype based outlier detection
Sort
View
RAID
2004
Springer
15 years 3 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
SEC
1996
14 years 11 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
BIBM
2009
IEEE
127views Bioinformatics» more  BIBM 2009»
15 years 4 months ago
A Device for Detecting and Counting Bites of Food Taken by a Person during Eating
—We introduce methods for detecting in real-time information concerning bites taken during a meal. Our methods use an orientation sensor placed on the wrist of a user, and analyz...
Yujie Dong, Adam Hoover, Eric Muth
WCRE
2002
IEEE
15 years 2 months ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman