Anomaly detection: A survey
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …
research areas and application domains. Many anomaly detection techniques have been …
[PDF][PDF] Outlier detection: applications and techniques
K Singh, S Upadhyaya - International Journal of Computer Science Issues …, 2012 - Citeseer
Outliers once upon a time regarded as noisy data in statistics, has turned out to be an
important problem which is being researched in diverse fields of research and application …
important problem which is being researched in diverse fields of research and application …
Bayesian methods for hidden Markov models: Recursive computing in the 21st century
SL Scott - Journal of the American statistical Association, 2002 - Taylor & Francis
Markov chain Monte Carlo (MCMC) sampling strategies can be used to simulate hidden
Markov model (HMM) parameters from their posterior distribution given observed data …
Markov model (HMM) parameters from their posterior distribution given observed data …
[PDF][PDF] Outlier detection: A survey
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct mapping between outliers in data and …
several application domains have realized the direct mapping between outliers in data and …
Computer intrusion: Detecting masquerades
M Schonlau, W DuMouchel, WH Ju, AF Karr, M Theus… - Statistical science, 2001 - JSTOR
Masqueraders in computer intrusion detection are people who use somebody else's
computer account. We investigate a number of statistical approaches for detecting …
computer account. We investigate a number of statistical approaches for detecting …
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access
logging, freeway traffic monitoring, and security logs associated with buildings. Since this …
logging, freeway traffic monitoring, and security logs associated with buildings. Since this …
Probabilistic techniques for intrusion detection based on computer audit data
N Ye, X Li, Q Chen, SM Emran… - IEEE Transactions on …, 2001 - ieeexplore.ieee.org
This paper presents a series of studies on probabilistic properties of activity data in an
information system for detecting intrusions into the information system. Various probabilistic …
information system for detecting intrusions into the information system. Various probabilistic …
[HTML][HTML] Resampling strategies for imbalanced time series forecasting
Time series forecasting is a challenging task, where the non-stationary characteristics of
data portray a hard setting for predictive tasks. A common issue is the imbalanced …
data portray a hard setting for predictive tasks. A common issue is the imbalanced …
A Bayesian paradigm for designing intrusion detection systems
SL Scott - Computational statistics & data analysis, 2004 - Elsevier
This article describes a model based approach to designing network intrusion detection
systems. The article considers general methods applicable to many different types of …
systems. The article considers general methods applicable to many different types of …
Demystifying Numenta anomaly benchmark
N Singh, C Olinsky - 2017 International Joint Conference on …, 2017 - ieeexplore.ieee.org
Detecting anomalies in large-scale, streaming datasets has wide applicability in a myriad of
domains like network intrusion detection for cyber-security, fraud detection for credit cards …
domains like network intrusion detection for cyber-security, fraud detection for credit cards …