-
1
-
2
A state machine system for insider threat detection
Published 2019“…Research has focused on providing rule-based detection systems or anomaly detection tools which use features indicative of malicious insider activity. …”
Conference item -
3
Intrusion detection for airborne communication using PHY-layer information
Published 2015“…Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.…”
Conference item -
4
Intrusion detection for airborne communication using PHY-layer information
Published 2015“…Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.…”
Conference item -
5
BRUNO: A deep recurrent model for exchangeable data
Published 2018“…The advantages of our architecture are demonstrated on learning tasks that require generalisation from short observed sequences while modelling sequence variability, such as conditional image generation, few-shot learning, and anomaly detection.…”
Conference item -
6
A Tripwire Grammar for Insider Threat Detection
Published 2016“…We then orchestrate these tripwires in conjunction with an anomaly detection system and present an approach to formalising tripwires of both categories. …”
Conference item -
7
Learning retrospective knowledge with reverse reinforcement learning
Published 2020“…We demonstrate empirically the utility of Reverse GVFs in both representation learning and anomaly detection.…”
Conference item -
8
The future of event-level information repositories, indexing, and selection in ATLAS
Published 2014“…This unique resource has been employed for a range of purposes, from monitoring, statistics, anomaly detection, and integrity checking, to event picking, subset selection, and sample extraction. …”
Conference item -
9
Interpretable stability bounds for spectral graph filters
Published 2021“…As a ubiquitous tool to process graph-structured data, spectral graph filters have been used to solve common tasks such as denoising and anomaly detection, as well as design deep learning architectures such as graph neural networks. …”
Conference item -
10
Reflecting on the use of sonification for network monitoring
Published 2016“…In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. …”
Conference item -
11
On detecting deception in space situational awareness
Published 2021“…We further develop and evaluate a machine-learning based anomaly detection tool which allows defenders to detect 90-98% of deception attempts with little to no in-house astrometry hardware. …”
Conference item -
12
Leveraging the urban soundscape: Auditory perception for smart vehicles
Published 2017“…We first model the urban soundscape and use anomaly detection to identify the presence of an anomalous sound, and later determine the nature of this sound. …”
Conference item -
13
On identifying anomalies in Tor usage with applications in detecting internet censorship
Published 2018“…We demonstrate the our approach in comparison to existing anomaly detection tools, and against both known historical internet censorship events and synthetic datasets. …”
Conference item