-
2
-
-
84889596052
-
Outlier ensembles: Position paper
-
Aggarwal, C.C.: Outlier ensembles: position paper. SIGKDD Explor. Newsl. 14(2), 49–58 (2013)
-
(2013)
SIGKDD Explor. Newsl
, vol.14
, Issue.2
, pp. 49-58
-
-
Aggarwal, C.C.1
-
3
-
-
84869014609
-
Topical anomaly detection from twitter stream
-
NewYork, ACM
-
Anantharam, P., Thirunarayan, K., Sheth, A.: Topical anomaly detection from twitter stream. In Proceedings of the 3rd Annual ACMWeb Science Conference, WebSci ’12, pp. 11–14, NewYork, ACM (2012)
-
(2012)
Proceedings of the 3Rd Annual Acmweb Science Conference, Websci ’12
, pp. 11-14
-
-
Anantharam, P.1
Thirunarayan, K.2
Sheth, A.3
-
4
-
-
77955347054
-
An informationtheoretic combining method for multi-classifier anomaly detection systems
-
Ashfaq, A., Javed, M., Khayam, S., Radha, H.: An informationtheoretic combining method for multi-classifier anomaly detection systems. In: Communications (ICC), 2010 IEEE international conference on, pp. 1–5 (2010)
-
(2010)
Communications (ICC), 2010 IEEE International Conference On
, pp. 1-5
-
-
Ashfaq, A.1
Javed, M.2
Khayam, S.3
Radha, H.4
-
5
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
New York, ACM
-
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM workshop on internet measurment, IMW ’02, pp. 71–82, New York, ACM (2002)
-
(2002)
Proceedings of the 2Nd ACM SIGCOMM Workshop on Internet Measurment, IMW ’02
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
6
-
-
79959804254
-
Shared bicycles in a city: A signal processing and data analysis perspective
-
Borgnat, P., Abry, P., Flandrin, P., Robardet, C., Rouquier, J.-B., Fleury, E.: Shared bicycles in a city: a signal processing and data analysis perspective. Adv. Complex Syst. 14(03), 415–438 (2011)
-
(2011)
Adv. Complex Syst
, vol.14
, Issue.3
, pp. 415-438
-
-
Borgnat, P.1
Abry, P.2
Flandrin, P.3
Robardet, C.4
Rouquier, J.-B.5
Fleury, E.6
-
7
-
-
77956376882
-
Anomaly extraction in backbone networks using association rules
-
New York, ACM
-
Brauckhoff, D., Dimitropoulos, X., Wagner, A., Salamatian, K.: Anomaly extraction in backbone networks using association rules. In: Proceedings of the 9thACMSIGCOMMconference on Internet measurement conference, IMC ’09, pp. 28–34, New York, ACM (2009)
-
(2009)
Proceedings of the 9Thacmsigcommconference on Internet Measurement Conference, IMC ’09
, pp. 28-34
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
8
-
-
15944390658
-
Algorithms for rapid outbreak detection: A research synthesis
-
Buckeridge, D.L., Burkom, H., Campbell, M., Hogan, W.R., Moore, A.W.: Algorithms for rapid outbreak detection: a research synthesis. J. Biomed. Inform. 38(2), 99–113 (2005)
-
(2005)
J. Biomed. Inform
, vol.38
, Issue.2
, pp. 99-113
-
-
Buckeridge, D.L.1
Burkom, H.2
Campbell, M.3
Hogan, W.R.4
Moore, A.W.5
-
10
-
-
84937275232
-
Assessing agreement on classification tasks: The kappa statistic
-
Carletta, J.: Assessing agreement on classification tasks: the kappa statistic. Comput. Linguist. 22(2), 249–254 (1996)
-
(1996)
Comput. Linguist
, vol.22
, Issue.2
, pp. 249-254
-
-
Carletta, J.1
-
11
-
-
68049121093
-
Anomaly detection: A survey
-
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009)
-
(2009)
ACM Comput. Surv
, vol.41
, Issue.3
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
12
-
-
57249114504
-
Biocaster: Detecting public health rumors with aweb-based text mining system
-
Collier, N., Doan, S., Kawazoe, A., Goodwin, R.M., Conway, M., Tateno, Y., Ngo, Q.-H., Dien, D., Kawtrakul, A., Takeuchi, K., et al.: Biocaster: detecting public health rumors with aweb-based text mining system. Bioinformatics 24(24), 2940–2941 (2008)
-
(2008)
Bioinformatics
, vol.24
, Issue.24
, pp. 2940-2941
-
-
Collier, N.1
Doan, S.2
Kawazoe, A.3
Goodwin, R.M.4
Conway, M.5
Tateno, Y.6
Ngo, Q.-H.7
Dien, D.8
Kawtrakul, A.9
Takeuchi, K.10
-
15
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
New York, ACM
-
Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., Cho K.: Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Proceedings of the 2007 workshop on Large scale attack defense, LSAD ’07, pp. 145–152, New York, ACM (2007)
-
(2007)
Proceedings of the 2007 Workshop on Large Scale Attack Defense, LSAD ’07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
18
-
-
3343019470
-
Measuring nominal scale agreement among many raters
-
Fleiss, J.L.: Measuring nominal scale agreement among many raters. Psychol. Bull. 76(5), 378–382 (1971)
-
(1971)
Psychol. Bull
, vol.76
, Issue.5
, pp. 378-382
-
-
Fleiss, J.L.1
-
19
-
-
0035416013
-
Difficulties in simulating the internet
-
Floyd, S., Paxson, V.: Difficulties in simulating the internet. IEEE/ACM Trans. Netw. 9(4), 392–403 (2001)
-
(2001)
IEEE/ACM Trans. Netw
, vol.9
, Issue.4
, pp. 392-403
-
-
Floyd, S.1
Paxson, V.2
-
20
-
-
79951608572
-
Mawilab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
-
New York, ACM
-
Fontugne, R., Borgnat, P., Abry, P., Fukuda, K.: Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: Proceedings of the 6th International COnference, Co-NEXT ’10, pp. 8:1–8:12. New York, ACM (2010)
-
(2010)
Proceedings of the 6Th International Conference, Co-Next ’10
-
-
Fontugne, R.1
Borgnat, P.2
Abry, P.3
Fukuda, K.4
-
21
-
-
85056067269
-
-
Freemeteo: Washington D.C. weather history
-
Freemeteo: Washington D.C. weather history. http://www.freemeteo.com (2013)
-
(2013)
-
-
-
22
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
ID’99, Berkeley
-
Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring. USENIX Association, vol. 1, pp. 6–6. ID’99, Berkeley (1999).
-
(1999)
Proceedings of the 1St Conference on Workshop on Intrusion Detection and Network Monitoring
, vol.1
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
23
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
Giacinto, G., Perdisci, R., Del Rio, M., Roli, F.: Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf. Fusion 9(1), 69–82 (2008)
-
(2008)
Inf. Fusion
, vol.9
, Issue.1
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Del Rio, M.3
Roli, F.4
-
25
-
-
0003684449
-
-
Springer, New York
-
Hastie, T., Tibshirani, R., Friedman, J.J.H.: The elements of statistical learning. vol. 1, Springer, New York (2001)
-
(2001)
The Elements of Statistical Learning
, vol.1
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
27
-
-
79960103750
-
Learning model trees from evolving data streams
-
Ikonomovska, E., Gama, J., Dzeroski, S.: Learning model trees from evolving data streams. Data Min. Knowl. Discov. 23(1), 128–168 (2011)
-
(2011)
Data Min. Knowl. Discov
, vol.23
, Issue.1
, pp. 128-168
-
-
Ikonomovska, E.1
Gama, J.2
Dzeroski, S.3
-
28
-
-
33947205080
-
A simulation study comparing aberration detection algorithms for syndromic surveillance
-
Jackson, M.L., Baer, A., Painter, I., Duchin, J.: A simulation study comparing aberration detection algorithms for syndromic surveillance. BMC Med. Inform. Decis. Mak. 7(1), 6 (2007)
-
(2007)
BMC Med. Inform. Decis. Mak
, vol.7
, Issue.1
-
-
Jackson, M.L.1
Baer, A.2
Painter, I.3
Duchin, J.4
-
29
-
-
84985989272
-
Event detection challenges, methods, and applications in natural and artificial systems
-
Lockheed Martin MS2
-
Kerman, M., Jiang, W., Blumberg, A., Buttrey, S.: Event detection challenges, methods, and applications in natural and artificial systems. In: Proceedings of 14th international command and control research and technology symposium, ICCRTS, Lockheed Martin MS2, pp. 1–19 (2009)
-
(2009)
Proceedings of 14Th International Command and Control Research and Technology Symposium, ICCRTS
, pp. 1-19
-
-
Kerman, M.1
Jiang, W.2
Blumberg, A.3
Buttrey, S.4
-
30
-
-
78651535118
-
Combining pattern classifiers: Methods and algorithms
-
Kuncheva, L.I.: Combining pattern classifiers: methods and algorithms. Wiley-Interscience (2004)
-
(2004)
Wiley-Interscience
-
-
Kuncheva, L.I.1
-
31
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. SIGCOMM Comput. Commun. Rev. 34(4), 219–230 (2004)
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
32
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
New York, ACM
-
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’05, pp. 217–228. New York, ACM (2005)
-
(2005)
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
33
-
-
0017360990
-
The measurement of observer agreement for categorical data
-
Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33(1), 159–174 (1977)
-
(1977)
Biometrics
, vol.33
, Issue.1
, pp. 159-174
-
-
Landis, J.R.1
Koch, G.G.2
-
34
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
New York, ACM
-
Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: Proceedings of the 6th ACMSIGCOMM conference on Internet measurement, IMC ’06, pp. 147–152. New York, ACM (2006)
-
(2006)
Proceedings of the 6Th ACMSIGCOMM Conference on Internet Measurement, IMC ’06
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
35
-
-
0034301517
-
The: Darpa off-line intrusion detection evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The: darpa off-line intrusion detection evaluation. Comput. Netw. 34(4), 579–595 (1999)
-
(1999)
Comput. Netw
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
36
-
-
84870484748
-
Modeling provenance for semantic desktop applications
-
Marins, A., Casanova, M.A., Furtado, A., Breitman, K.: Modeling provenance for semantic desktop applications. In: SEMISH-Anais do Seminario Integrado de Software eHardware 34, pp. 2101–2112 (2007)
-
(2007)
Semish-Anais Do Seminario Integrado De Software Ehardware
, vol.34
, pp. 2101-2112
-
-
Marins, A.1
Casanova, M.A.2
Furtado, A.3
Breitman, K.4
-
37
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inform. Syst. Secur. 3(4), 262–294 (2000)
-
(2000)
ACM Trans. Inform. Syst. Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
38
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
New York, ACM
-
Nychis, G., Sekar, V., Andersen, D.G., Kim, H., Zhang, H.: An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8thACMSIGCOMMconference on Internet measurement, IMC ’08, pp. 151–156. New York, ACM (2008)
-
(2008)
Proceedings of the 8Thacmsigcommconference on Internet Measurement, IMC ’08
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Ersen, D.G.3
Kim, H.4
Zhang, H.5
-
39
-
-
84860407215
-
Multivariate singular spectrum analysis for forecasting revisions to real-time data
-
Patterson, K., Hassani, H., Heravi, S., Zhigljavsky, A.: Multivariate singular spectrum analysis for forecasting revisions to real-time data. J. Appl. Stat. 38(10), 2183–2211 (2011)
-
(2011)
J. Appl. Stat
, vol.38
, Issue.10
, pp. 2183-2211
-
-
Patterson, K.1
Hassani, H.2
Heravi, S.3
Zhigljavsky, A.4
-
41
-
-
78650730087
-
Webclass: Adding rigor to manual labeling of traffic anomalies
-
Ringberg, H., Soule, A., Rexford, J.: Webclass: adding rigor to manual labeling of traffic anomalies. SIGCOMM Comput. Commun. Rev. 38(1), 35–38 (2008)
-
(2008)
SIGCOMM Comput. Commun. Rev
, vol.38
, Issue.1
, pp. 35-38
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
-
42
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
New York, ACM
-
Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S.-H., Rao, S., Taft, N., Tygar, J.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the 9th ACMSIGCOMM conference on Internet measurement conference, IMC ’09, pp. 1–14. New York, ACM (2009)
-
(2009)
Proceedings of the 9Th ACMSIGCOMM Conference on Internet Measurement Conference, IMC ’09
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
43
-
-
72349099830
-
An ontology for event detection and its application in surveillance video
-
Washington, DC
-
San Miguel, J.C., Martinez, J.M., Garcia, A.: An ontology for event detection and its application in surveillance video. In: Proceedings of the 2009 sixth IEEE international conference on advanced video and signal based surveillance, AVSS ’09, IEEE Computer Society, pp. 220–225. Washington, DC (2009)
-
(2009)
Proceedings of the 2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS ’09
, pp. 220-225
-
-
San Miguel, J.C.1
Martinez, J.M.2
Garcia, A.3
-
44
-
-
33847761464
-
Nongaussian and long memory statistical characterizations for internet traffic with anomalies
-
Scherrer, A., Larrieu, N., Owezarski, P., Borgnat, P., Abry, P.: Nongaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans. Dependable Secur. Comput. 4(1), 56–70 (2007)
-
(2007)
IEEE Trans. Dependable Secur. Comput
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
45
-
-
0442296744
-
A bayesian paradigm for designing intrusion detection systems
-
Scott, S.L.: A bayesian paradigm for designing intrusion detection systems. Comput. Stat. Data Anal. 45(1), 69–83 (2004)
-
(2004)
Comput. Stat. Data Anal
, vol.45
, Issue.1
, pp. 69-83
-
-
Scott, S.L.1
-
46
-
-
77955398869
-
-
University of Hawaii at Manoa, Technical report series
-
Senin, P.: Dynamic time warping algorithm review. In: University of Hawaii at Manoa, Technical report series (2008)
-
(2008)
Dynamic Time Warping Algorithm Review
-
-
Senin, P.1
-
47
-
-
65249105995
-
Accurate anomaly detection through parallelism
-
Shanbhag, S., Wolf, T.: Accurate anomaly detection through parallelism. Netw. Mag. Glob. Internetwkg. 23(1), 22–28 (2009)
-
(2009)
Netw. Mag. Glob. Internetwkg
, vol.23
, Issue.1
, pp. 22-28
-
-
Shanbhag, S.1
Wolf, T.2
-
48
-
-
27544486362
-
The effects of algorithmic diversity on anomaly detector performance. Dependable systems and networks, 2005. DSN2005
-
Tan, K., Maxion, R.: The effects of algorithmic diversity on anomaly detector performance. Dependable systems and networks, 2005. DSN2005. In: Proceedings of international conference on, pp. 216–225 (2005)
-
(2005)
Proceedings of International Conference On
, pp. 216-225
-
-
Tan, K.1
Maxion, R.2
-
49
-
-
85056029811
-
Performance evaluation of anomalybased detection mechanisms
-
University of Newcastle upon Tyne, Newcastle upon Tyne, NE1 7RU, UK
-
Tan, K.M.C., Maxion, R.A.: Performance evaluation of anomalybased detection mechanisms. In: Technical report series CS-TR- 870, University of Newcastle upon Tyne, Newcastle upon Tyne, NE1 7RU, UK (2004)
-
(2004)
Technical Report Series CS-TR- 870
-
-
Tan, K.1
Maxion, R.A.2
-
50
-
-
77950575061
-
A detailed analysis of the kdd cup 99 data set
-
Piscataway, NJ, IEEE Press
-
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: Proceedings of the second IEEE international conference on Computational intelligence for security and defense applications, CISDA’09, Piscataway, NJ, pp. 53–58. IEEE Press (2009)
-
(2009)
Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, CISDA’09
, pp. 53-58
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
51
-
-
80052996527
-
Understanding bike-sharing systems using data mining: Exploring activity patterns
-
Vogel, P., Greiser, T., Mattfeld, D.C.: Understanding bike-sharing systems using data mining: exploring activity patterns. Procedia Soc. Behav. Sci. 20, 514–523 (2011)
-
(2011)
Procedia Soc. Behav. Sci
, vol.20
, pp. 514-523
-
-
Vogel, P.1
Greiser, T.2
Mattfeld, D.C.3
-
52
-
-
0032639421
-
Detecting intrusions using system calls: Alternative datamodels. In security and privacy, 1999
-
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative datamodels. In security and privacy, 1999. In: Proceedings of the 1999 IEEE symposium on, pp. 133–145 (1999)
-
(1999)
Proceedings of the 1999 IEEE Symposium On
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
53
-
-
33745667977
-
Empirical analysis of rate limiting mechanisms
-
Springer, Heidelberg
-
Wong, C., Bielski, S., Studer, A., Wang, C.: Empirical analysis of rate limiting mechanisms. In: Proceedings of the 8th international conference on Recent Advances in Intrusion Detection, RAID’ 05, pp. 22–42. Springer, Heidelberg (2006)
-
(2006)
Proceedings of the 8Th International Conference on Recent Advances in Intrusion Detection, RAID’ 05
, pp. 22-42
-
-
Wong, C.1
Bielski, S.2
Studer, A.3
Wang, C.4
-
54
-
-
29144530575
-
What’s strange about recent events (Wsare): An algorithm for the early detection of disease outbreaks
-
Wong, W.-K., Moore, A., Cooper, G., Wagner, M.: What’s strange about recent events (wsare): an algorithm for the early detection of disease outbreaks. J. Mach. Learn. Res. 6, 1961–1998 (2005)
-
(2005)
J. Mach. Learn. Res
, vol.6
, pp. 1961-1998
-
-
Wong, W.-K.1
Moore, A.2
Cooper, G.3
Wagner, M.4
-
55
-
-
56549121057
-
Using webcast text for semantic event detection in broadcast sports video
-
Xu, C., Zhang, Y.-F., Zhu, G., Rui, Y., Lu, H., Huang, Q.: Using webcast text for semantic event detection in broadcast sports video. Multimedia IEEE Trans. 10(7), 1342–1355 (2008)
-
(2008)
Multimedia IEEE Trans
, vol.10
, Issue.7
, pp. 1342-1355
-
-
Xu, C.1
Zhang, Y.-F.2
Zhu, G.3
Rui, Y.4
Lu, H.5
Huang, Q.6
-
56
-
-
77954577189
-
Collaborative location and activity recommendations with gps history data
-
New York, ACM
-
Zheng, V.W., Zheng, Y., Xie, X., Yang, Q.: Collaborative location and activity recommendations with gps history data. In: Proceedings of the 19th international conference on World wide web, WWW’10, pp. 1029–1038. New York, ACM (2010)
-
(2010)
Proceedings of the 19Th International Conference on World Wide Web, WWW’10
, pp. 1029-1038
-
-
Zheng, V.W.1
Zheng, Y.2
Xie, X.3
Yang, Q.4
|