• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 51,779
Next 10 →

anomaly detection algorithm

by Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki
"... An evaluation of automatic parameter tuning of a statistics-based ..."
Abstract - Add to MetaCart
An evaluation of automatic parameter tuning of a statistics-based

anomaly detection algorithms in hyperspectral images

by M. Zare-baghbidi, S. Homayouni, K. Jamshidi, A. R. Naghsh-nilchi , 2015
"... Anomaly Detection (AD) has recently become an important application of hyperspectral images analysis. The goal of these algorithms is to find the objects in the image scene which are anomalous in comparison with their surrounding background. One way to improve the performance and runtime of these al ..."
Abstract - Add to MetaCart
Anomaly Detection (AD) has recently become an important application of hyperspectral images analysis. The goal of these algorithms is to find the objects in the image scene which are anomalous in comparison with their surrounding background. One way to improve the performance and runtime

ANOMALY DETECTION ALGORITHMS FOR HYPERSPECTRAL IMAGERY

by S. R. Soofbaf, H. Fahimnejad, M. J. Valadan Zoej, B. Mojaradi
"... Nowadays the use of hyperspectral imagery specifically automatic target detection algorithms for these images is a relatively exciting area of research. An important challenge of hyperspectral target detection is to detect small targets without any prior knowledge, particularly when the interested t ..."
Abstract - Add to MetaCart
Nowadays the use of hyperspectral imagery specifically automatic target detection algorithms for these images is a relatively exciting area of research. An important challenge of hyperspectral target detection is to detect small targets without any prior knowledge, particularly when the interested

Comparing Anomaly-Detection Algorithms for Keystroke Dynamics

by Kevin S. Killourhy, Roy A. Maxion
"... Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since many anomaly-detection algorithms have been proposed for this task, it is natural to ask which are the top performers (e.g., to ..."
Abstract - Cited by 47 (3 self) - Add to MetaCart
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since many anomaly-detection algorithms have been proposed for this task, it is natural to ask which are the top performers (e

Application of anomaly detection algorithms for detecting SYN flooding attacks

by Vasilios A. Siris, Fotini Papagalou - In Proceedings of IEEE Globecom , 2004
"... Abstract — We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms considered are an adaptive threshold algorithm and a particular application of the cumulative sum (CUSUM) algorithm for c ..."
Abstract - Cited by 67 (1 self) - Add to MetaCart
Abstract — We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms considered are an adaptive threshold algorithm and a particular application of the cumulative sum (CUSUM) algorithm

A Comparative Evaluation of Anomaly Detection Algorithms for Maritime Video Surveillance

by Bryan Ausl, Kalyan Moy Gupta, David W. Aha
"... A variety of anomaly detection algorithms have been applied to surveillance tasks for detecting threats with some success. However, it is not clear which anomaly detection algorithms should be used for domains such as ground-based maritime video surveillance. For example, recently introduced algorit ..."
Abstract - Add to MetaCart
A variety of anomaly detection algorithms have been applied to surveillance tasks for detecting threats with some success. However, it is not clear which anomaly detection algorithms should be used for domains such as ground-based maritime video surveillance. For example, recently introduced

A Comparative Study of Anomaly Detection Algorithms for Detection of SIP Flooding

by M. Ali Akbar, Zeeshan Tariq, Muddassar Farooq - in IMS,” in Proceedings of the International Conference on Internet Multimedia Services Architecture and Applications (IMSAA , 2008
"... Abstract—The IP Multimedia Subsystem (IMS) framework uses Session Initiation Protocol (SIP) for signaling and control of sessions. In this paper, we first demonstrate that SIP flooding attacks on IMS can result in denial of service to the legitimate users. Afterwards, we report our comparative study ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
study of three well-known anomaly detection algorithms, Adaptive threshold, Cumulative sum, and Hellinger distance) for detection of flood attacks in IMS. We evaluate the accuracy of the algorithms using a comprehensive traffic dataset that consists of varying benign and malicious traffic patterns. I.

An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering

by Ren Wei-wu, Hu Liang, Zhao Kuo, Chu Jianfeng
"... Abstract—For the purpose of improving real time and profiles accuracy, a parallel anomaly detection algorithm based on hierarchical clustering has been proposed. Training and predicting are two busiest processes and they are parallel designed and implemented. Moreover, an abnormal cluster feature tr ..."
Abstract - Add to MetaCart
Abstract—For the purpose of improving real time and profiles accuracy, a parallel anomaly detection algorithm based on hierarchical clustering has been proposed. Training and predicting are two busiest processes and they are parallel designed and implemented. Moreover, an abnormal cluster feature

Anomaly Detection Algorithm Test Bench for Mobile Network Management

by Pekka Kumpulainen, Kimmo Hätönen, Espoo Finland
"... Huge amounts of operation data are constantly collected from the performance monitoring and system logs from servers in communication networks. One of the key applications for system operators is to detect anomalies in the data. The anomalies may indicate various types of situations that need attent ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
for testing anomaly detection algorithms in network management environment. We introduce a test bench implementation and illustrate its properties with two local anomaly detection methods. One is based on SOM (Self Organizing Map) and clustering. Another one is an extension to a basic clustering method

A FRAMEWORK FOR THE RAPID DEVELOPMENT OF ANOMALY DETECTION ALGORITHMS IN NETWORK INTRUSION DETECTION SYSTEMS

by Richard J Barnett, Barry Irwin
"... Most current Network Intrusion Detection Systems (NIDS) perform detection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limite ..."
Abstract - Add to MetaCart
limited and often requires a full recompilation of the system to deploy new algorithms. As a result, anomaly detection algorithms are time consuming, difficult and cumbersome to develop. This paper presents an alternative system which permits the deployment of anomaly detection algorithms without the need
Next 10 →
Results 1 - 10 of 51,779
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University