Information Technology Reference
In-Depth Information
14. Berger, T.M., Durrant-Whyte, H.F.: Model distribution in decentralized multi-
sensor data fusion. In: American Control Conference. IEEE (1991)
15. Chandola, V.: Anomaly detection for symbolic sequences and time series data.
Diss. University of Minnesota (2009)
16. Kriegel, H.-P., et al.: Interpreting and Unifying Outlier Scores. In: SDM (2011)
17. Geusebroek, J.M., Burghouts, G.J., Smeulders, A.: The Amsterdam Library of
Object Images. Int. J. Computer Vision 61(1), 103-112 (2005)
18. Grnitz, N., Kloft, M.M., Rieck, K., Brefeld, U.: Toward supervised anomaly detec-
tion. arXiv preprint arXiv:1401.6424 (2014)
19. Rajab, M.A., et al.: CAMP: Content-Agnostic Malware Protection. In: NDSS
(2013)
20. Rieck, K., et al.: Automatic analysis of malware behavior using machine learning.
Journal of Computer Security 19(4), 639-668 (2011)
21. Jang, J., Brumley, D., Venkataraman, S.: Bitshred: feature hashing malware for
scalable triage and semantic analysis. In: Proceedings of the 18th ACM Conference
on Computer and Communications Security. ACM (2011)
22. Egele, M., et al.: A survey on automated dynamic malware-analysis techniques and
tools. ACM Computing Surveys (CSUR) 44(2), 6 (2012)
23. Thom, D., et al.: Spatiotemporal anomaly detection through visual analysis of ge-
olocated twitter messages. In: 2012 IEEE Pacific Visualization Symposium (Paci-
ficVis). IEEE (2012)
24. Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based
local outliers. SIGMOD Rec. 29(2) (May 2000)
25. Zhang, K., Hutter, M., Jin, H.: A New Local Distance-Based Outlier Detection
Approach for Scattered Real-World Data. In: Proceedings of the 13th Pacific-Asia
Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2009
(2009)
Search WWH ::




Custom Search