This report presents problematic issues with analyzing user behaviors of a repetitive nature for Anomaly Detection using the Markov Chain model. The users in the data tend to use certain events in succession for a long period of time. Doing the same thing in succession can be normal but when can these users be considered to have an abnormal behavior? The work done in this report presents two alterative ways of representing the data for letting the Markov Chain capture large sections of repeating events without needing to increase the order of the Markov Chain. The presented representations show promising results for an increase in the Markov Chain capability to distinguish users of repetitive nature from each other, as well as suggestions f...
Much of the current work in human behaviour modelling concentrates on activity recognition, recognis...
This paper presents a probabilistic approach for the identification of abnormal behaviour in Activit...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...
This report presents problematic issues with analyzing user behaviors of a repetitive nature for Ano...
This report presents problematic issues with analyzing user behaviors of a repetitive nature for Ano...
The task of using Markov chains to develop a statistical behavioral model of a DS user to detect abn...
The identification of recurring patterns within a sequence of events is an important task in behavio...
Time-series of count data occur in many different contexts, including internet navigation logs, free...
Abstract. This paper introduces the computer security domain of anomaly detection and formulates it ...
described the problem of modeling the behavior of a typical user of an electronic information system...
Streaming data services, such as video-on-demand, are getting increasingly more popular, and they ar...
Streaming data services, such as video-on-demand, are getting increasingly more popular, and they ar...
This thesis is concerned with the study of problems related to the measurement of disorder in the da...
In this work we present a prototype application for modelling common behaviours from long-time obser...
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining...
Much of the current work in human behaviour modelling concentrates on activity recognition, recognis...
This paper presents a probabilistic approach for the identification of abnormal behaviour in Activit...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...
This report presents problematic issues with analyzing user behaviors of a repetitive nature for Ano...
This report presents problematic issues with analyzing user behaviors of a repetitive nature for Ano...
The task of using Markov chains to develop a statistical behavioral model of a DS user to detect abn...
The identification of recurring patterns within a sequence of events is an important task in behavio...
Time-series of count data occur in many different contexts, including internet navigation logs, free...
Abstract. This paper introduces the computer security domain of anomaly detection and formulates it ...
described the problem of modeling the behavior of a typical user of an electronic information system...
Streaming data services, such as video-on-demand, are getting increasingly more popular, and they ar...
Streaming data services, such as video-on-demand, are getting increasingly more popular, and they ar...
This thesis is concerned with the study of problems related to the measurement of disorder in the da...
In this work we present a prototype application for modelling common behaviours from long-time obser...
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining...
Much of the current work in human behaviour modelling concentrates on activity recognition, recognis...
This paper presents a probabilistic approach for the identification of abnormal behaviour in Activit...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...