Showing 1 - 7 results of 7 for search '"anomaly detection"', query time: 0.06s Refine Results
  1. 1

    Adaptive and online data anomaly detection for wireless sensor systems by Rassam, Murad Abdo, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2014
    “…In this paper, two efficient and effective anomaly detection models PCCAD and APCCAD are proposed for static and dynamic environments, respectively. …”
    Article
  2. 2

    Real valued negative selection for anomaly detection in wireless ad hoc networks by Abdul Majid, Azri, Maarof, Mohd. Aizaini

    Published 2004
    “…To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network.…”
    Get full text
    Conference or Workshop Item
  3. 3

    Iterative window size estimation on self-similarity measurement for network traffic anomaly detection by Idris, Mohd. Yazid, Abdullah, Abdul Hanan, Maarof, Mohd. Aizaini

    Published 2004
    “…Thus, the purpose of this method is to minimize the curve-fitting error on self-similarity measurement and detection loss probability in anomaly detection. This iterative method was applied to network traffic data provided by Lincoln Lab, Massachuset Institute of Technology (MIT). …”
    Article
  4. 4

    A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier by A. Rassam, Murad, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2018
    “…In this paper, we proposed a one-class principal component classifier (OCPCC) based distributed anomaly detection model for WSN, which utilises the spatial correlations among sensed data in closed neighbourhoods. …”
    Article
  5. 5

    Fast optimization method: an on-line hurst parameter estimator by Idris, Mohd. Yazid, Abdullah, Abdul Hanan, Maarof, Mohd. Aizaini

    Published 2007
    “…The on-line Hurst estimator is crucial to characterize self-similar feature on stochastic process and widely applied in various fields such as in network traffic analysis, bandwidth provisioning and anomaly detection. Recent on-line Hurst estimator based on fast wavelet transform known as real-time wavelet estimator (RWM) is proven can estimates faster than other methods in on-line fashion. …”
    Conference or Workshop Item
  6. 6

    Potential issues in novel computational research: artificial immune systems by Iqbal, Anjum, Maarof, Mohd. Aizaini

    Published 2003
    “…The dramatic features of HIS like distributability, uniqueness, adaptability, mobility, imperfect-detection, and anomaly-detection, have grabbed the attention of computational researchers for adopting HIS principles to design AIS that are robust, scalable, highly flexible, resilient to sub-versioning, and degrade gracefully. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Analysis of malicious traffic and its impact to QoS metric LRD and energy invariant by Rohani, Mohd. Fo'ad, Maarof, Mohd. Aizaini, Selamat, Ali

    Published 2006
    “…These changes in the LRD function and Energy Invariant therefore can give direction of developing more robust network anomaly detection. We use benchmark DARPA for our data testing. …”
    Get full text
    Conference or Workshop Item