Works matching DE "ANOMALY detection (Computer security)"


Results: 2508
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14

    Anomalies in Internet Law.

    Published in:
    International Review of Law, Computers & Technology, 2007, v. 21, n. 3, p. 305, doi. 10.1080/13600860701701587
    By:
    • Kleve, Pieter;
    • De Mulder, Richard
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21
    22
    23

    Anomaly detection with inexact labels.

    Published in:
    Machine Learning, 2020, v. 109, n. 8, p. 1617, doi. 10.1007/s10994-020-05880-w
    By:
    • Iwata, Tomoharu;
    • Toyoda, Machiko;
    • Tora, Shotaro;
    • Ueda, Naonori
    Publication type:
    Article
    24
    25

    Constraint-based clustering selection.

    Published in:
    Machine Learning, 2017, v. 106, n. 9-10, p. 1497, doi. 10.1007/s10994-017-5643-7
    By:
    • Craenendonck, Toon;
    • Blockeel, Hendrik
    Publication type:
    Article
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50