Context-aware graph-based analysis for detecting anomalous activities
暂无分享,去创建一个
Junsong Yuan | Jiaqi Zhang | Yap-Peng Tan | Sreyasee Das Bhattacharjee | Yap-Peng Tan | Junsong Yuan | S. Bhattacharjee | Jiaqi Zhang
[1] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[2] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[3] Oliver Brdiczka,et al. Multi-Domain Information Fusion for Insider Threat Detection , 2013, 2013 IEEE Security and Privacy Workshops.
[4] Lawrence B. Holder,et al. Mining Graph Data: Cook/Mining Graph Data , 2006 .
[5] Yizhou Yu,et al. Anomaly detection in GPS data based on visual analytics , 2010, 2010 IEEE Symposium on Visual Analytics Science and Technology.
[6] Joshua Glasser,et al. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.
[7] Yale Song,et al. Tracking body and hands for gesture recognition: NATOPS aircraft handling signals database , 2011, Face and Gesture 2011.
[8] Bhavani M. Thuraisingham,et al. Insider Threat Detection Using Stream Mining and Graph Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[9] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[10] Vladimir Kolmogorov,et al. An Experimental Comparison of Min-Cut/Max-Flow Algorithms for Energy Minimization in Vision , 2004, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[12] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[13] David Page,et al. Area under the Precision-Recall Curve: Point Estimates and Confidence Intervals , 2013, ECML/PKDD.
[14] Bianca Zadrozny,et al. Outlier detection by active learning , 2006, KDD '06.
[15] Kai Ming Ting,et al. Fast Anomaly Detection for Streaming Data , 2011, IJCAI.
[16] George M. Mohay,et al. Detection of Anomalies from User Profiles Generated from System Logs , 2011, AISC.
[17] Lawrence B. Holder,et al. Discovering Structural Anomalies in Graph-Based Data , 2007, Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007).
[18] E. Parzen. On Estimation of a Probability Density Function and Mode , 1962 .
[19] Zenglin Xu,et al. Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users , 2015, ESORICS.
[20] Yale Song,et al. One-Class Conditional Random Fields for Sequential Anomaly Detection , 2013, IJCAI.
[21] Lawrence B. Holder,et al. Mining Graph Data , 2006 .
[22] Vladimir Kolmogorov,et al. An experimental comparison of min-cut/max- flow algorithms for energy minimization in vision , 2001, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[23] David Page,et al. Area under the Precision-Recall Curve: Point Estimates and Confidence Intervals , 2013, ECML/PKDD.
[24] Thorsten Joachims,et al. Learning structural SVMs with latent variables , 2009, ICML '09.
[25] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[26] Bradley Malin,et al. Detection of anomalous insiders in collaborative environments via relational analysis of access logs , 2011, CODASPY '11.