Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Anomaly detection")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 264

  • Page / 11
Export

Selection :

  • and

Estimation of anomaly location and size using electrical impedance tomographyKWON, Ohin; JEONG ROCK YOON; JIN KEUN SEO et al.IEEE transactions on biomedical engineering. 2003, Vol 50, Num 1, pp 89-96, issn 0018-9294, 8 p.Article

Anomaly Detection: A SurveyCHANDOLA, Varun; BANERJEE, Arindam; KUMAR, Vipin et al.ACM computing surveys. 2009, Vol 41, Num 3, issn 0360-0300, 15:1-15:58Article

Online fatigue damage monitoring by ultrasonic measurements : A symbolic dynamics approachGUPTA, Shalabh; RAY, Asok; KELLER, Eric et al.International journal of fatigue. 2007, Vol 29, Num 6, pp 1100-1114, issn 0142-1123, 15 p.Article

Statistical foundations of audit trail analysis for the detection of computer misuseHELMAN, P; LIEPINS, G.IEEE transactions on software engineering. 1993, Vol 19, Num 9, pp 886-901, issn 0098-5589Article

Magnetic Anomaly Detection Using a Three-Axis MagnetometerSHEINKER, Arie; FRUMKIS, Lev; GINZBURG, Boris et al.IEEE transactions on magnetics. 2009, Vol 45, Num 1, pp 160-167, issn 0018-9464, 8 p., 1Article

Anomaly Detection and Reconstruction From Random ProjectionsFOWLER, James E; QIAN DU.IEEE transactions on image processing. 2012, Vol 21, Num 1, pp 184-195, issn 1057-7149, 12 p.Article

Asymptotically CFAR-Unsupervised Target Detection and Discrimination in Hyperspectral Images With Anomalous-Component PursuitHUCK, Alexis; GUILLAUME, Mireille.IEEE transactions on geoscience and remote sensing. 2010, Vol 48, Num 11, pp 3980-3991, issn 0196-2892, 12 p.Article

Kernel RX-algorithm: A nonlinear anomaly detector for hyperspectral imageryKWON, Heesung; NASRABADI, Nasser M.IEEE transactions on geoscience and remote sensing. 2005, Vol 43, Num 2, pp 388-397, issn 0196-2892, 10 p.Article

Universal Outlier Hypothesis TestingYUN LI; NITINAWARAT, Sirin; VEERAVALLI, Venugopal V et al.IEEE transactions on information theory. 2014, Vol 60, Num 7, pp 4066-4082, issn 0018-9448, 17 p.Article

Day/Night Polarimetric Anomaly Detection Using SPICE ImageryROMANO, Joao M; ROSARIO, Dalton; MCCARTHY, James et al.IEEE transactions on geoscience and remote sensing. 2012, Vol 50, Num 12, pp 5014-5023, issn 0196-2892, 10 p.Article

HeapMD : Identifying heap-based bugs using anomaly detectionCHILIMBI, Trishul M; GANAPATHY, Vinod.ACM SIGPLAN notices. 2006, Vol 41, Num 11, pp 219-228, issn 1523-2867, 10 p.Conference Paper

Statistical anomaly detection via httpd data analysisNAIMAN, Daniel Q.Computational statistics & data analysis. 2004, Vol 45, Num 1, pp 51-67, issn 0167-9473, 17 p.Article

Foundation and application of knowledge base verificationPREECE, A. D; SHINGHAL, R.International journal of intelligent systems. 1994, Vol 9, Num 8, pp 683-701, issn 0884-8173Article

An adaptive elliptical anomaly detection model for wireless sensor networksMOSHTAGHI, Masud; LECKIE, Christopher; KARUNASEKERA, Shanika et al.Computer networks (1999). 2014, Vol 64, pp 195-207, issn 1389-1286, 13 p.Article

Decision tree based control chart pattern recognitionWANG, Chih-Hsuan; GUO, Ruey-Shan; CHIANG, Ming-Huang et al.International journal of production research. 2008, Vol 46, Num 17, pp 4889-4901, issn 0020-7543, 13 p.Article

Mutual Information Applied to Anomaly DetectionKOPYLOVA, Yuliya; BUELL, Duncan A; HUANG, Chin-Tser et al.Journal of communication and networks. 2008, Vol 10, Num 1, pp 89-97, issn 1229-2370, 9 p.Article

Rigorous stochastic bounds for the error in large covariance matricesBÖTTCHER, Albrecht; WENZEL, David.Mathematical methods in the applied sciences. 2008, Vol 31, Num 10, pp 1209-1220, issn 0170-4214, 12 p.Article

Network-Wide Anomaly Detection Based on Router Connection Relationships : Deployment and Operation of New Internet Technology: Challenges and ApproachesYINGJIE ZHOU; GUANGMIN HU.IEICE transactions on communications. 2011, Vol 94, Num 8, pp 2239-2242, issn 0916-8516, 4 p.Article

Recursive spectral similarity measure-based band selection for anomaly detection in hyperspectral imageryYUANLEI HE; DAIZHI LIU; SHIHUA YI et al.Journal of optics (Print). 2011, Vol 13, Num 1, issn 2040-8978, 015401.1-015401.7Article

Anomaly detection in RFID systemsGARRI, Khaled; SAILHAN, Francoise; BOUZEFRANE, Samia et al.International journal of radio frequency identification technology and applications (Print). 2011, Vol 3, Num 1-2, pp 31-46, issn 1745-3216, 16 p.Article

Finding Cardinality Heavy-Hitters in Massive Traffic Data and Its Application to Anomaly Detection : Communication qualityISHIBASHI, Keisuke; MORI, Tatsuya; KAWAHARA, Ryoichi et al.IEICE transactions on communications. 2008, Vol 91, Num 5, pp 1331-1339, issn 0916-8516, 9 p.Article

Network Anomaly Detection using Nonextensive EntropyZIVIANI, Artur; GOMES, Antonio Tadeu A; MONSORES, Marcelo L et al.IEEE communications letters. 2007, Vol 11, Num 12, pp 1034-1036, issn 1089-7798, 3 p.Article

Intrusion detection by monitoring system calls with POSIX capabilities : New challenge for internet technology and its architectureHARUYAMA, Takahiro; NAKAZATO, Hidenori; TOMINAGA, Hideyoshi et al.IEICE transactions on communications. 2007, Vol 90, Num 10, pp 2646-2654, issn 0916-8516, 9 p.Article

Local Coregistration Adjustment for Anomalous Change DetectionTHEILER, James; WOHLBERG, Brendt.IEEE transactions on geoscience and remote sensing. 2012, Vol 50, Num 8, pp 3107-3116, issn 0196-2892, 10 p.Article

Vibration testing for anomaly detectionAMMARI, Habib; KANG, Hyeonbae; KIM, Eunjoo et al.Mathematical methods in the applied sciences. 2009, Vol 32, Num 7, pp 863-874, issn 0170-4214, 12 p.Article

  • Page / 11