• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,870
Next 10 →

Anomaly Detection: A Survey

by Varun Chandola, Arindam Banerjee, Vipin Kumar , 2007
"... Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and c ..."
Abstract - Cited by 540 (5 self) - Add to MetaCart
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured

Graph-based anomaly detection

by Caleb C. Noble - In KDD , 2003
"... Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A good deal of research has been performed in this area, often using strings or attribute-value data as the medium from whi ..."
Abstract - Cited by 110 (2 self) - Add to MetaCart
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A good deal of research has been performed in this area, often using strings or attribute-value data as the medium from

Information-Theoretic Measures for Anomaly Detection

by Wenke Lee, Dong Xiang - In Proceedings of the 2001 IEEE Symposium on Security and Privacy , 2001
"... Anomaly detection is an essential component of the protection mechanisms against novel attacks. In this paper, we propose to use several information-theoretic measures, namely, entropy, conditional entropy, relative conditional entropy, information gain, and information cost, for anomaly detection. ..."
Abstract - Cited by 166 (7 self) - Add to MetaCart
Anomaly detection is an essential component of the protection mechanisms against novel attacks. In this paper, we propose to use several information-theoretic measures, namely, entropy, conditional entropy, relative conditional entropy, information gain, and information cost, for anomaly detection

Anomaly Detection

by Ashok N. Srivastava - Center , 2006
"... The detection of clouds within a satellite im-age is essential for retrieving surface geophys-ical parameters from optical and thermal im-agery. Even a small percentage of cloud cover within a radiometer pixel can adversely af-fect the determination of surface variables such as albedo and temperatur ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The detection of clouds within a satellite im-age is essential for retrieving surface geophys-ical parameters from optical and thermal im-agery. Even a small percentage of cloud cover within a radiometer pixel can adversely af-fect the determination of surface variables such as albedo

anomaly detection in

by Pietro Morerio, Lucio Marcenaro, Carlo S. Regazzoni
"... A bio-inspired knowledge representation method for ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
A bio-inspired knowledge representation method for

with anomaly detection

by T. E. De Campos, Aftab Khan, Fei Yan, Nazli Farajidavar, David Windridge, Josef Kittler, William Christmas, Guildford Gu Xh
"... framework for automatic sports video annotation ..."
Abstract - Add to MetaCart
framework for automatic sports video annotation

• Anomaly Detection

by Tina Eliassi-rad (rutgers, Christos Faloutsos (cmu, T. Eliassi-rad, C. Faloutsos Resource, T. Eliassi-rad
"... • www.cs.cmu.edu/~pegasus ..."
Abstract - Add to MetaCart
• www.cs.cmu.edu/~pegasus

Anomaly Detection

by Teemu Tuulari , 2006
"... ..."
Abstract - Add to MetaCart
Abstract not found

Anomaly Detection

by unknown authors , 1995
"... This material contains infonation affecting the notional defense of the United States within the meaning of the Espionage Laws (Title 18, U.S.C., Sections 793, 794) the transmission or revelation of which in any manner to an unauthorized person i prohibited by law. In addition to security requiremen ..."
Abstract - Add to MetaCart
This material contains infonation affecting the notional defense of the United States within the meaning of the Espionage Laws (Title 18, U.S.C., Sections 793, 794) the transmission or revelation of which in any manner to an unauthorized person i prohibited by law. In addition to security requirements which apply to this document and must be met, each transmittal eutside the Department ef Defense must have prier approval ef AFCRL, XO, L.G. Hanscom Field.

Anomaly Detection and Diagnosis in Grid Environments

by Jennifer Schopf, Ian Foster, Lingyun Yang, Chuang Liu, Jennifer M. Schopf, Ian Foster , 2007
"... Anomaly detection and diagnosis in grid environments ..."
Abstract - Add to MetaCart
Anomaly detection and diagnosis in grid environments
Next 10 →
Results 1 - 10 of 5,870
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University