. . "Anomaly detection (Computer security)"@en . _:b7iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b7iddOtlocdOtgovauthoritiessubjectssh2005007675 _:b8iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b7iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b8iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b8iddOtlocdOtgovauthoritiessubjectssh2005007675 "Anomaly detection (Computer security)"@en . _:b11iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b11iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b11iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b11iddOtlocdOtgovauthoritiessubjectssh2005007675 "Detection, Anomaly (Computer security)"@en . _:b11iddOtlocdOtgovauthoritiessubjectssh2005007675 _:b16iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b16iddOtlocdOtgovauthoritiessubjectssh2005007675 _:b17iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b16iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b17iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b17iddOtlocdOtgovauthoritiessubjectssh2005007675 "Detection, Anomaly (Computer security)"@en . "150 $aAnomaly detection (Computer security)" . . . "Anomalieerkennung" . . . "Détection des anomalies (informatique)"@fr . . . . "Computer security"@en . _:b35iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b35iddOtlocdOtgovauthoritiessubjectssh2005007675 _:b36iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b35iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b36iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b36iddOtlocdOtgovauthoritiessubjectssh2005007675 "Computer security"@en . . . "Anomaly detection (Computer security)" . . . "anomaly detection" . . . . . . "Anomaly detection" . . . "Anomaly detection" . . . "Applied cloud deep semantic recognition" . . . "Bhattacharyya, Dhruba K. Network anomaly detection" . . . "Dunning, Ted, 1956- Practical machine learning" . . . "Ide, Tsuyoshi Ijō kenchi to henka kenchi" . . . "The state of the art in intrusion prevention and detection" . . . "Trost, Ryan Practical intrusion analysis" . . . "Using computational intelligence for the dark web and illicit behavior detection" . . . "Using computational intelligence for the dark web and illicit behavior detection" . . "sh2005007675" . . . _:b95iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b95iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b95iddOtlocdOtgovauthoritiessubjectssh2005007675 "Work cat.: Nassehi, M.M. Anomaly detection for Markov models, 1998:" . _:b95iddOtlocdOtgovauthoritiessubjectssh2005007675 "p. 1 (Anomaly detection is an intrusion-detection technique in which any significant deviation of the current characteristics of a process from its expected characteristics generates an alarm)"@en . _:b95iddOtlocdOtgovauthoritiessubjectssh2005007675 "found" . _:b103iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b103iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b103iddOtlocdOtgovauthoritiessubjectssh2005007675 "McGraw-Hill dictionary of scientific and technical terms, 2003" . _:b103iddOtlocdOtgovauthoritiessubjectssh2005007675 "(anomaly detection -- The technology that seeks to identify an attack on a computer system by looking for behavior that is out of the norm)"@en . _:b103iddOtlocdOtgovauthoritiessubjectssh2005007675 "found" . _:b111iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b111iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b111iddOtlocdOtgovauthoritiessubjectssh2005007675 "TechEncyclopedia, via WWW, Nov. 17, 2005" . _:b111iddOtlocdOtgovauthoritiessubjectssh2005007675 "(Anomaly detection ... An approach to intrusion detection that establishes a baseline model of behavior for users and components in a computer system or network. Deviations from the baseline cause alerts that direct the attention of human operators to the anomalies)"@en . _:b111iddOtlocdOtgovauthoritiessubjectssh2005007675 "found" . _:b119iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b119iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b119iddOtlocdOtgovauthoritiessubjectssh2005007675 "Glossary of web application security terms, via WWW, Nov. 17, 2005" . _:b119iddOtlocdOtgovauthoritiessubjectssh2005007675 "(Anomaly detection -- Behavior-based anomaly detection compares a profile of all allowed application behavior to actual traffic. Any deviation from the profile is flagged as a potential attack. It is commonly referred to as a positive security model because it seeks only to identify all known good behaviors and assumes that everything else is bad)"@en . _:b119iddOtlocdOtgovauthoritiessubjectssh2005007675 "found" . _:b127iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b127iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b127iddOtlocdOtgovauthoritiessubjectssh2005007675 "Information Systems Audit and Control Association glossary, via WWW, Nov. 17, 2005" . _:b127iddOtlocdOtgovauthoritiessubjectssh2005007675 "(Anomaly detection -- Detection on the basis of whether the system activity matched that defined as abnormal)"@en . _:b127iddOtlocdOtgovauthoritiessubjectssh2005007675 "found" . _:b135iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b135iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b135iddOtlocdOtgovauthoritiessubjectssh2005007675 "Dictionary of computing, 1996;Dictionary of computer and internet words, 2001;Encyclopedia of computer science, 2000;Dictionary of computer science, engineering, and technology, 2001" . _:b135iddOtlocdOtgovauthoritiessubjectssh2005007675 "notfound" . _:b141iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b141iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b141iddOtlocdOtgovauthoritiessubjectssh2005007675 "2006-03-15T00:00:00"^^ . _:b141iddOtlocdOtgovauthoritiessubjectssh2005007675 "new"^^ . _:b141iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b141iddOtlocdOtgovauthoritiessubjectssh2005007675 . . "Anomaly detection (Computer security)"@en . _:b152iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b152iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b152iddOtlocdOtgovauthoritiessubjectssh2005007675 "Detection, Anomaly (Computer security)"@en . . . "Computer security"@en . . . "Anomalieerkennung" . . . "Détection des anomalies (informatique)"@fr . . . "Anomaly detection (Computer security)" . . . "anomaly detection" . . "Detection, Anomaly (Computer security)"@en . _:b185iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b185iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b185iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b185iddOtlocdOtgovauthoritiessubjectssh2005007675 . _:b185iddOtlocdOtgovauthoritiessubjectssh2005007675 "2006-03-15T00:00:00"^^ . _:b185iddOtlocdOtgovauthoritiessubjectssh2005007675 "new"^^ .