http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2012154657-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f7ec3d6b26208287dbc7f99b672638ef
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d4a9b1b846456abca1c05aa2bf5f0351
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_709b4a26ef028713f9b302509eb824d7
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_90277e7633a78c724069b34d6fbef07d
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N5-01
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N20-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0227
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N7-01
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1425
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-08
filingDate 2012-05-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9a74ff33b1c7a0a2ff710b734e86b915
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_2513f059111cf65947c07e874d7bb5bf
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_db8a1301f52e20acd23db0d4e9d32536
publicationDate 2012-11-15-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2012154657-A2
titleOfInvention Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows
abstract Sound, robust methods identify the most suitable, parsimonious set of tests to use with respect to prioritized, sequential anomaly detection in a collected batch of sample data. While the focus is on detecting anomalies in network traffic flows and classifying network traffic flows into application types, the methods are also applicable to other anomaly detection and classification application settings, including detecting email spam, (e.g. credit card) fraud detection, detecting imposters, unusual event detection (for example, in images and video), host-based computer intrusion detection, detection of equipment or complex system failures, as well as of anomalous measurements in scientific experiments.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2019221965-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-3293661-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11783046-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2018200112-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11017330-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10986110-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11621969-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10291640-B2
priorityDate 2011-05-06-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID62086
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415730267
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID534918
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID36181
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID101886162
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID244666
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID36181
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID128868700
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID292101
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID100127870
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID83932
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID1486
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID100036995

Total number of triples: 42.