搜索资源列表
nk2
- 半监督异常行为监测pdf,提出新的基于半监督学习的行为建模与异常检测方法,采用基于动态时间归整的归一化距离来建立相似矩阵-Semi-supervised monitoring abnormal behavior pdf, propose a new semi-supervised Learning based on behavior modeling and anomaly detection methods, based on Dynamic Time Warping of the norma
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
UnsupervisedAnomalyDetectionBasedOnPrincipalCompon
- 入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process
ids
- For anomaly detection
Global-Behaviour-Inference-using-PLSA
- This paperpresent a novel framework for inferring global behaviour patterns through modelling behaviour correlations in a wide-area scene and detecting any anomaly in behaviours occurring both locally and globally. Specifically, This paperpropose
Project_Template2
- ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS
01714200
- K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection
wsnand
- anomaly detection in wsn
243
- 2008年—extending the RX anomaly detection algorithm to continuous spectral and spatial domains.pdf
214123
- 2009年—A Comparison Study of Dual Window-Based Anomaly Detection Algorithms for Hyperspectral Imagery.pdf
System-Anomaly-Detection-Mining-Firewall
- this about detection anomaly on firewa-this is about detection anomaly on firewall
zhinengdianzishuye-sheji-
- 利用单片机设计并制作一个智能化的液体点滴速度监测与控制装置。该装置由水滴速度测试系统、水速控制系统、气泡空液阻塞检测系统,电源异常检测系统,显示滴速装置、故障处理系统,报警系统等系统组成。应用光透射原理监测滴速,利用控制步进电动机的转速来控制点滴速度,利用红外二极管监测液面高度,利用压力传感器检测导管堵塞,利用超声传感器气泡。点滴速度可用键盘来设定同时在水到达警戒线以下时能发出报警信号。-The use of single-chip design and production of an int
anomaly-detection
- 自适应的基于ROC的HMMs在异常检测中的应用-Adaptive ROC-based ensembles of HMMs applied to anomaly detection
TwoPhaseClusteringDetectionOutliers
- Two-phase clustering is implemented for outlier detection. Outlier detection or anomaly detection is important for researchers.
TKDE2012ABNORMALDETECTION
- TKDE2012 时间序列分析的异常检测综述 论文-TKDE2012 time series analysis of anomaly detection reviewed papers
2005-Kernel-RX-AlgorithmA
- 非线性核RX算法(KRX算法)来完成异常目标检测,不仅有效地利用了高光谱图像波段间的高阶统计特性和非线性信息,而且避免了对高维数据的特征提取,从而降低了算法的复杂度.-Nonlinear nuclear RX algorithm (KRX algorithm) to complete anomaly detection, not only the effective use of higher-order statistical characteristics of hyperspectral
som-wave
- Anomaly Detection using Self-Organizing Map and Wavelets in Wireless Sensor Networks-Anomaly Detection using Self-Organizing Map and Wavelets in Wireless Sensor Networks
group-anomaly-detection
- 基于光流直方图和稀疏表示的群体异常事件检测-Detecting abnormal events based group optical flow histogram and sparse representation
chen2013
- A NEW ONE-CLASS SVM FOR ANOMALY DETECTION
Introduction.To.Data.Mining].Pang
- 数据挖掘介绍,包括数据预处理,可视化,预测建模,关联分析,聚类和异常检测(Data mining introduces data preprocessing, visualization, predictive modeling, association analysis, clustering, and anomaly detection)