Author:
Wang Xiaochun,Wang Xiali,Wilkes Mitch
Reference26 articles.
1. Akaike, H. (1969). Fitting autoregressive models for prediction. Annals of the Institute of Statistical Mathematics, 21(1), 243–247.
2. Ye, N. (2000). A Markov chain model of temporal behavior for anomaly detection. In Proceedings of the 2000 IEEE SMC Information Assurance and Security Workshop (Vol. 166, pp. 171–174).
3. Yang, J., & Wang, W. (2003). CLUSEQ: Efficient and effective sequence clustering. In Proceedings of the 19th IEEE International Conference on Data Engineering (ICDE’03), Bangalore, India (pp. 101–112).
4. Sun, P., Chawla, S., & Arunasalam, B. (2006). Mining for outliers in sequential databases. In Proceedings of the 6th SIAM International Conference on Data Mining (SDM’06), Bethesda, MD, United states (pp. 94–105).
5. Eskin, E., Lee, W., & Stolfo, S. (2001). Modeling system calls for intrusion detection with dynamic window sizes. In Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX’01), Anaheim, CA, United states (Vol. 1, pp. 165–175).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AI Techniques for Anomaly Detection in Video Surveillance Using Deep Learning Method;2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT);2024-05-03
2. Anomaly Detection in Image Processing using Artificial Intelligence;2023 International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT);2023-03-17