Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13999 open access dissertations and theses found for:
if(Anomaly detection)  »   Refine Search
1.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
2.
Small Anomalous Mass Detection from Airborne Gradiometry
by Dumrongchai, Puttipol, Ph.D.  The Ohio State University. 2007: 282 pages; 10836010.
3.
Mechanisms for database intrusion detection and response
by Kamra, Ashish, Ph.D.  Purdue University. 2010: 144 pages; 3444799.
4.
Anomaly Detection on Social Data
by Hanbo, Dai, Ph.D.  Singapore Management University (Singapore). 2013: 146 pages; 3601348.
5.
Probabilistic Clustering Ensemble Evaluation for Intrusion Detection
by McElwee, Steven M., Ph.D.  Nova Southeastern University. 2018: 166 pages; 10844875.
7.
Improving non-linear approaches to anomaly detection, class separation, and visualization
by Paciencia, Todd J., Ph.D.  Air Force Institute of Technology. 2014: 354 pages; 3667806.
8.
9.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
10.
Big Data Analytics and Engineering for Medicare Fraud Detection
by Herland, Matthew Andrew, Ph.D.  Florida Atlantic University. 2019: 205 pages; 13814186.
11.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
12.
Machine learning for the automatic detection of anomalous events
by Fisher, Wendy D., Ph.D.  Colorado School of Mines. 2017: 173 pages; 10258193.
13.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
14.
Spectral Analysis of Directed Graphs using Matrix Perturbation Theory
by Li, Yuemeng, Ph.D.  The University of North Carolina at Charlotte. 2017: 143 pages; 10618933.
15.
Strategic targeting of outliers for expert review
by Rebbapragada, Umaa Devi, Ph.D.  Tufts University. 2010: 176 pages; 3422362.
17.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
19.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
21.
*Multidimensional analysis of moving object data
by Li, Xiaolei, Ph.D.  University of Illinois at Urbana-Champaign. 2008: 143 pages; 3314964.
22.
An inconsistency-based approach for sensing assessment in unknown environments
by Gage, Jennifer Diane, Ph.D.  University of South Florida. 2009: 268 pages; 3420536.
23.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
24.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
25.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
26.
The Dynamics of Precipitation Variability in the Asian Monsoon
by Day, Jesse Alexander, Ph.D.  University of California, Berkeley. 2016: 150 pages; 10150844.
27.
Advanced feature learning and representation in image processing for anomaly detection
by Price, Stanton Robert, M.S.  Mississippi State University. 2015: 110 pages; 1586997.
28.
A Comprehensive View of Home Energy Management
by Lachut, David S., Ph.D.  University of Maryland, Baltimore County. 2018: 120 pages; 10825526.
30.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
1 - 30 of 13999 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest