Login / Signup
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection.
Salvatore J. Stolfo
Frank Apap
Eleazar Eskin
Katherine A. Heller
Shlomo Hershkop
Andrew Honig
Krysta M. Svore
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
anomaly detection
comparative evaluation
one class support vector machines
intrusion detection
detecting anomalies
anomalous behavior
network anomaly detection
learning algorithm
computer security
data mining
information retrieval
machine learning
decision trees
detect anomalies
connectionist systems