-
1
-
-
77951185124
-
Effective anomaly detection in sensor networks data streams
-
S. Budhaditya, D.-S. Pham, M. Lazarescu, and S. Venkatesh, "Effective Anomaly Detection in Sensor Networks Data Streams," Proc. IEEE Int'l Conf. Data Mining (ICDM '09), pp. 722-727, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Data Mining (ICDM '09)
, pp. 722-727
-
-
Budhaditya, S.1
Pham, D.-S.2
Lazarescu, M.3
Venkatesh, S.4
-
2
-
-
80052674644
-
On-line fault diagnosis based on the identification of transient stages
-
M. Isaac, B. Raul, E. Gerard, and G. Moisès, "On-Line Fault Diagnosis Based on the Identification of Transient Stages," Proc. 20th European Symp. Computer Aided Process Eng., 2010.
-
(2010)
Proc. 20th European Symp. Computer Aided Process Eng
-
-
Isaac, M.1
Raul, B.2
Gerard, E.3
Moisès, G.4
-
4
-
-
51849128252
-
Anomaly detection in high-dimensional network data streams: A case study
-
June
-
J. Zhang, Q. Gao, and H. Wang, "Anomaly Detection in High-Dimensional Network Data Streams: A Case Study," Proc. IEEE Int'l Conf. Intelligence and Security Informatics, pp. 251-253, June 2008.
-
(2008)
Proc. IEEE Int'l Conf. Intelligence and Security Informatics
, pp. 251-253
-
-
Zhang, J.1
Gao, Q.2
Wang, H.3
-
6
-
-
23944525543
-
A wireless sensor network for structural monitoring
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
N. Xu et al., "A Wireless Sensor Network for Structural Monitoring," Proc. Int'l Conf. Embedded Networked Sensor Systems, pp. 13-24, 2004. (Pubitemid 41563345)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 13-24
-
-
Xu, N.1
Rangwala, S.2
Chintalapudi, K.K.3
Ganesan, D.4
Broad, A.5
Govindan, R.6
Estrin, D.7
-
8
-
-
77952757262
-
Mining distribution change in stock order streams
-
X. Liu, X. Wu, H. Wang, R. Zhang, J. Bailey, and K. Ramamohanarao, "Mining Distribution Change in Stock Order Streams," Proc. Int'l Conf. Data Eng. (ICDE), pp. 105-108, 2010.
-
Proc. Int'l Conf. Data Eng. (ICDE)
, vol.2010
, pp. 105-108
-
-
Liu, X.1
Wu, X.2
Wang, H.3
Zhang, R.4
Bailey, J.5
Ramamohanarao, K.6
-
9
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing Network-Wide Traffic Anomalies," Proc. ACM SIGCOMM, pp. 219-230, 2004. (Pubitemid 40954882)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
10
-
-
51349158726
-
In-network PCA and anomaly detection
-
L. Huang, M.I. Jordan, A. Joseph, M. Garofalakis, and N. Taft, "In-Network PCA and Anomaly Detection," Proc. Advances in Neural Information Processing System (NIPS), pp. 617-624, 2006.
-
(2006)
Proc. Advances in Neural Information Processing System (NIPS)
, pp. 617-624
-
-
Huang, L.1
Jordan, M.I.2
Joseph, A.3
Garofalakis, M.4
Taft, N.5
-
11
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
DOI 10.1145/1090191.1080118
-
A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions," Proc. ACM SIGCOMM, pp. 217-228, 2005. (Pubitemid 46323506)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
12
-
-
36349029177
-
Sensitivity of PCA for traffic anomaly detection
-
DOI 10.1145/1269899.1254895, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
-
H. Ringberg, A. Soule, J. Rexford, and C. Diot, "Sensitivity of PCA for Traffic Anomaly Detection," SIGMETRICS '07: Proc. ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems, pp. 109-120, 2007. (Pubitemid 350158077)
-
(2007)
Performance Evaluation Review
, vol.35
, Issue.1
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
13
-
-
33745309913
-
Sparse principal component analysis
-
DOI 10.1198/106186006X113430
-
H. Zou, T. Hastie, and R. Tibshirani, "Sparse Principal Component Analysis," J. Computational and Graphical Statistics, vol. 15, no. 2, pp. 265-286, 2006. (Pubitemid 43935978)
-
(2006)
Journal of Computational and Graphical Statistics
, vol.15
, Issue.2
, pp. 265-286
-
-
Zou, H.1
Hastie, T.2
Tibshirani, R.3
-
14
-
-
70349680977
-
Applying PCA for traffic anomaly detection: Problems and solutions
-
D. Brauckhoff, K. Salamatian, and M. May, "Applying PCA for Traffic Anomaly Detection: Problems and Solutions," Proc. IEEE INFOCOM, pp. 2866-2870, 2009.
-
(2009)
Proc. IEEE INFOCOM
, pp. 2866-2870
-
-
Brauckhoff, D.1
Salamatian, K.2
May, M.3
-
15
-
-
67649637304
-
Online anomaly prediction for robust cluster systems
-
X. Gu and H. Wang, "Online Anomaly Prediction for Robust Cluster Systems," Proc. Int'l Conf. Data Eng. (ICDE), pp. 1000-1011, 2009.
-
(2009)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 1000-1011
-
-
Gu, X.1
Wang, H.2
-
16
-
-
52649161757
-
Trajectory outlier detection: A partition-and-detect framework
-
J.-G. Lee, J. Han, and X. Li, "Trajectory Outlier Detection: A Partition-and-Detect Framework," Proc. Int'l Conf. Data Eng. (ICDE), pp. 140-149, 2008.
-
(2008)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 140-149
-
-
Lee, J.-G.1
Han, J.2
Li, X.3
-
17
-
-
77956376882
-
Anomaly extraction in backbone networks using association rules
-
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian, "Anomaly Extraction in Backbone Networks Using Association Rules," Proc. Ninth ACM SIGCOMM Conf. Internet Measurement Conf., pp. 28-34, 2009.
-
(2009)
Proc. Ninth ACM SIGCOMM Conf. Internet Measurement Conf
, pp. 28-34
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
18
-
-
34548547034
-
HOT SAX: Efficiently finding the most unusual time series subsequence
-
DOI 10.1109/ICDM.2005.79, 1565683, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
E. Keogh, J. Lin, and A. Fu, "Hot Sax: Efficiently Finding the Most Unusual Time Series Subsequence," Proc. Fifth IEEE Int'l Conf. Data Mining, pp. 226-233, 2005. (Pubitemid 47385697)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 226-233
-
-
Keogh, E.1
Lin, J.2
Fu, A.3
-
19
-
-
0034704229
-
A global geometric framework for nonlinear dimensionality reduction
-
DOI 10.1126/science.290.5500.2319
-
J.B. Tenenbaum, V. de Silva, and J.C. Langford, "A Global Geometric Framework for Nonlinear Dimensionality Reduction," Science, vol. 290, no. 5500, pp. 2319-2323, 2000. (Pubitemid 32041577)
-
(2000)
Science
, vol.290
, Issue.5500
, pp. 2319-2323
-
-
Tenenbaum, J.B.1
De Silva, V.2
Langford, J.C.3
-
20
-
-
81955161256
-
Distributed detection/localization of change-points in high-dimensional network traffic data
-
A. Lung-Yut-Fong, C. Lévy-Leduc, and O. Cappé, "Distributed Detection/Localization of Change-Points in High-Dimensional Network Traffic Data," Statistics and Computing, vol. 22, pp. 485-496, 2009.
-
(2009)
Statistics and Computing
, vol.22
, pp. 485-496
-
-
Lung-Yut-Fong, A.1
Lévy-Leduc, C.2
Cappé, O.3
-
21
-
-
72849150929
-
Proximity-based anomaly detection using sparse structure learning
-
T. Idé, A.C. Lozano, N. Abe, and Y. Liu, "Proximity-Based Anomaly Detection Using Sparse Structure Learning," Proc. SIAM Int'l Conf. Data Mining, pp. 97-108, 2009.
-
(2009)
Proc. SIAM Int'l Conf. Data Mining
, pp. 97-108
-
-
Idé, T.1
Lozano, A.C.2
Abe, N.3
Liu, Y.4
-
22
-
-
49749143714
-
Computing correlation anomaly scores using stochastic nearest neighbors
-
T. Idé, S. Papadimitriou, and M. Vlachos, "Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors," ICDM '07: Proc. Seventh IEEE Int'l Conf. Data Mining, pp. 523-528, 2007.
-
(2007)
ICDM '07: Proc. Seventh IEEE Int'l Conf. Data Mining
, pp. 523-528
-
-
Idé, T.1
Papadimitriou, S.2
Vlachos, M.3
-
23
-
-
70350635778
-
Network anomaly detection based on eigen equation compression
-
S. Hirose, K. Yamanishi, T. Nakata, and R. Fujimaki, "Network Anomaly Detection Based on Eigen Equation Compression," KDD '09: Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 1185-1194, 2009.
-
(2009)
KDD '09: Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 1185-1194
-
-
Hirose, S.1
Yamanishi, K.2
Nakata, T.3
Fujimaki, R.4
-
24
-
-
70349320004
-
Detecting projected outliers in high-dimensional data streams
-
J. Zhang, Q. Gao, H.H. Wang, Q. Liu, and K. Xu, "Detecting Projected Outliers in High-Dimensional Data Streams," Proc. Int'l Conf. Database and Expert Systems Applications, pp. 629-644, 2009.
-
(2009)
Proc. Int'l Conf. Database and Expert Systems Applications
, pp. 629-644
-
-
Zhang, J.1
Gao, Q.2
Wang, H.H.3
Liu, Q.4
Xu, K.5
-
25
-
-
84862912487
-
Anomaly detection on collective moving patterns: Manifold learning based analysis of traffic streams
-
S. Yang and W. Zhou, "Anomaly Detection on Collective Moving Patterns: Manifold Learning Based Analysis of Traffic Streams," Proc. IEEE Third Int'l Conf. Social Computing (socialcom), pp. 704-707, 2011.
-
(2011)
Proc. IEEE Third Int'l Conf. Social Computing (Socialcom)
, pp. 704-707
-
-
Yang, S.1
Zhou, W.2
-
26
-
-
78650467471
-
Attribute outlier detection over data streams
-
H. Cao, Y. Zhou, L. Shou, and G. Chen, "Attribute Outlier Detection over Data Streams," Proc. Int'l Conf. Database Systems for Advanced Applications, vol. 2, pp. 216-230, 2010.
-
(2010)
Proc. Int'l Conf. Database Systems for Advanced Applications
, vol.2
, pp. 216-230
-
-
Cao, H.1
Zhou, Y.2
Shou, L.3
Chen, G.4
-
28
-
-
80052677632
-
Anomaly localization for network data streams with graph joint sparse PCA
-
R. Jiang, H. Fei, and J. Huan, "Anomaly Localization for Network Data Streams with Graph Joint Sparse PCA," Proc. ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD), pp. 886-894, 2011.
-
(2011)
Proc. ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD)
, pp. 886-894
-
-
Jiang, R.1
Fei, H.2
Huan, J.3
-
30
-
-
33645035051
-
Model selection and estimation in regression with grouped variables
-
DOI 10.1111/j.1467-9868.2005.00532.x
-
M. Yuan, M. Yuan, Y. Lin, and Y. Lin, "Model Selection and Estimation in Regression with Grouped Variables," J. Royal Statistical Soc., Series B, vol. 68, pp. 49-67, 2006. (Pubitemid 43415335)
-
(2006)
Journal of the Royal Statistical Society. Series B: Statistical Methodology
, vol.68
, Issue.1
, pp. 49-67
-
-
Yuan, M.1
Lin, Y.2
-
31
-
-
16244401458
-
Regularization and variable selection via the elastic net
-
DOI 10.1111/j.1467-9868.2005.00503.x
-
H. Zou and T. Hastie, "Regularization and Variable Selection via the Elastic Net," J. Royal Statistical Soc. B, vol. 67, pp. 301-320, 2005. (Pubitemid 40465877)
-
(2005)
Journal of the Royal Statistical Society. Series B: Statistical Methodology
, vol.67
, Issue.2
, pp. 301-320
-
-
Zou, H.1
Hastie, T.2
-
36
-
-
56049109090
-
Map-reduce for machine learning on multicore
-
C.-T. Chu, S.K. Kim, Y.-A. Lin, Y. Yu, G.R. Bradski, A.Y. Ng, and K. Olukotun, "Map-Reduce for Machine Learning on Multicore," Proc. Advances in Neural Information Processing System (NIPS), pp. 281-288, 2006.
-
(2006)
Proc. Advances in Neural Information Processing System (NIPS)
, pp. 281-288
-
-
Chu, C.-T.1
Kim, S.K.2
Lin, Y.-A.3
Yu, Y.4
Bradski, G.R.5
Ng, A.Y.6
Olukotun, K.7
-
38
-
-
68049121093
-
Anomaly detection: A survey
-
article 15
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly Detection: A Survey," ACM Computing Survey, vol. 41, no. 3, article 15, 2009.
-
(2009)
ACM Computing Survey
, vol.41
, Issue.3
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
41
-
-
84900191605
-
Selecting features for intrusion detection: A feature relevance analysis on KDD 99
-
H.G. Kayacik, A.N. Zincir-Heywood, and M.I. Heywood, "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99," Proc. Third Ann. Conf. Privacy, Security and Trust (PST), 2005.
-
(2005)
Proc. Third Ann. Conf. Privacy, Security and Trust (PST)
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
42
-
-
85083945898
-
Feature ranking and selection for intrusion detection systems using support vector machines
-
S. Mukkamala and A.H. Sung, "Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines," Proc. Second Digital Forensic Research Workshop, 2002.
-
(2002)
Proc. Second Digital Forensic Research Workshop
-
-
Mukkamala, S.1
Sung, A.H.2
|