2002
DOI: 10.1109/38.974517
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion and misuse detection in large-scale systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 99 publications
(54 citation statements)
references
References 6 publications
0
53
0
1
Order By: Relevance
“…6B). When examining timesteps [9,10,11], an emergent focal activation point (annotated in Fig. 6C) in the lower-right corner of the electrode view was evident.…”
Section: Spatio-temporal Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…6B). When examining timesteps [9,10,11], an emergent focal activation point (annotated in Fig. 6C) in the lower-right corner of the electrode view was evident.…”
Section: Spatio-temporal Analysismentioning
confidence: 99%
“…Glidgets [18] depicts temporal changes by segmenting glyphs into time slices, enabling the comparison of attributes over time. Nan Cao et al [6] and Erbacher et al [9] aggregate temporal data to summarize the entire dataset with the overall goal of detecting anomalous behavior in the network. ECoG ClusterFlow utilizes some of the aforementioned concepts to provide unique glyph-based designs and visual analysis methods that show the overall modular changes of the network.…”
Section: Spatio-temporal Datamentioning
confidence: 99%
“…The goal is to identifiable summarization of different activities. For example Erbacher et al [5] introduced a radial glyph that summarizes a web server's activity of connecting to other severs over time. Anemone [6] introduced a glyph showing the statistical information of users' visiting a web page.…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detection refers to statistical knowledge about normal activity. The anomaly detection approach can be categorized into semisupervised and unsupervised anomaly detection [4]. Semisupervised anomaly detection approaches need a set of purely normal training data from which they found the profile of normal behavior.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%