×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [anomaly detection system]
Nathalie Japkowicz, Colin Bellinger, Shiven Sharma, Rodney Berg, Kurt Ungar University of Ottawa, Northern Illinois University Radiation Protection Bureau,
223 views
Intrusion Response for Rel DB
12 views
An Auctioning Reputation System Based on Anomaly Detection Shai Rubin, Mihai Christodorescu Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang,
214 views
Scope project presentation SCientific innOvation Product concEpt 2009-2011 4.12.2009
213 views
1 Guide to Network Defense and Countermeasures Chapter 8
272 views
APPLICATION OF THE METHOD AND COMBINED ALGORITHM ON THE BASIS OF IMMUNE NETWORK AND NEGATIVE SELECTION FOR IDENTIFICATION OF TURBINE ENGINE SURGING Lytvynenko
217 views
Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009
17 views
Towards Understanding the Usage Pattern of Web-based Electronic Medical Record System
38 views
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection Robin Sommer, Vern Paxson IEEE Security & Privacy, 2010
221 views
Scope project presentation SC ientific inn O vation P roduct conc E pt 2009-2011 4.12.2009
16 views
Anomaly Detection in Gamma Ray Spectra: A Machine Learning Perspective
37 views