Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection.
Xiao YuLu An TangJiawei HanPublished in: ICDM (2009)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- detecting anomalies
- computer security
- network traffic
- unsupervised anomaly detection
- network intrusion detection
- intrusion detection system
- detect anomalies
- network anomaly detection
- behavior analysis
- one class support vector machines
- negative selection algorithm
- pattern recognition
- network security
- unsupervised learning
- face recognition
- support vector machine