This paper develops a new approach for detecting self-propagating email viruses based on statistical anomaly detection. Our approach assumes that a key ...
This paper develops a new approach for detecting self-propagating email viruses based on statistical anomaly detection. Our approach assumes that a key ...
People also ask
What are the three 3 basic approaches to anomaly detection?
What are anomaly based detection methods?
Which technique is used for anomaly detection?
What is an example of anomaly detection?
Bibliographic details on An Approach for Detecting Self-propagating Email Using Anomaly Detection.
This paper develops a new approach for detecting self-propagating email viruses based on statistical anomaly detection. Our approach assumes that a key ...
An Approach for Detecting Self-propagating Email Using Anomaly Detection. This paper develops a new approach for detecting self-propagating email viruses ...
[20] An Approach for Detecting Self-Propagating Email Using Anomaly Detection ... [21] Specification-based anomaly detection: a new approach for detecting network ...
Nov 21, 2024 · This paper develops a new approach for detecting self-propagating email viruses based on statistical anomaly detection. Our approach assumes ...
Anomaly detection algorithms can be classified in a few different ways based on the nature of the approach. These are statistical, distance-based, density- ...
Anomaly detection techniques compute a model of normal behavior of systems by observing them, and detect deviations from this norm. We have tended to avoid ...
This paper develops a new approach for detecting abnormal email traffic in backbone network by using an extended finite state automata (EFSA) model.