An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events
暂无分享,去创建一个
[1] Comparison Levine,et al. Quantitative Applications in the Social Sciences , 2006 .
[2] Sebastian Fischmeister,et al. Anomaly Detection Using Inter-Arrival Curves for Real-Time Systems , 2016, 2016 28th Euromicro Conference on Real-Time Systems (ECRTS).
[3] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[4] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[5] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[6] Per Runeson,et al. Detection of Duplicate Defect Reports Using Natural Language Processing , 2007, 29th International Conference on Software Engineering (ICSE'07).
[7] Sebastian Fischmeister,et al. Dataset for Anomaly Detection Using Inter-Arrival Curves for Real-time Systems , 2016 .
[8] Charu C. Aggarwal,et al. On the Surprising Behavior of Distance Metrics in High Dimensional Spaces , 2001, ICDT.
[9] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[10] R. Sokal,et al. THE COMPARISON OF DENDROGRAMS BY OBJECTIVE METHODS , 1962 .
[11] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[12] R. Little. A Test of Missing Completely at Random for Multivariate Data with Missing Values , 1988 .
[13] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[14] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[15] Robert R. Sokal,et al. A statistical method for evaluating systematic relationships , 1958 .
[16] Tao Xie,et al. An approach to detecting duplicate bug reports using natural language and execution information , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[17] T. Stijnen,et al. Review: a gentle introduction to imputation of missing values. , 2006, Journal of clinical epidemiology.
[18] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[19] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.