Showing 1 - 13 results of 13 for search '"anomaly detection"', query time: 0.07s Refine Results
  1. 1
  2. 2

    A state machine system for insider threat detection by Zhang, H, Agrafiotis, I, Erola, A, Creese, S, Goldsmith, M

    Published 2019
    “…Research has focused on providing rule-based detection systems or anomaly detection tools which use features indicative of malicious insider activity. …”
    Conference item
  3. 3

    Intrusion detection for airborne communication using PHY-layer information by Strohmeier, M, Lenders, V, Martinovic, I

    Published 2015
    “…Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.…”
    Conference item
  4. 4

    Intrusion detection for airborne communication using PHY-layer information by Strohmeier, M, Lenders, V, Martinovic, I

    Published 2015
    “…Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.…”
    Conference item
  5. 5

    BRUNO: A deep recurrent model for exchangeable data by Korshunova, I, Degrave, J, Huszár, F, Gal, Y, Gretton, A, Dambre, J

    Published 2018
    “…The advantages of our architecture are demonstrated on learning tasks that require generalisation from short observed sequences while modelling sequence variability, such as conditional image generation, few-shot learning, and anomaly detection.…”
    Conference item
  6. 6

    A Tripwire Grammar for Insider Threat Detection by Agrafiotis, I, Erola, A, Goldsmith, M, Creese, S

    Published 2016
    “…We then orchestrate these tripwires in conjunction with an anomaly detection system and present an approach to formalising tripwires of both categories. …”
    Conference item
  7. 7

    Learning retrospective knowledge with reverse reinforcement learning by Zhang, S, Veeriah, V, Whiteson, S

    Published 2020
    “…We demonstrate empirically the utility of Reverse GVFs in both representation learning and anomaly detection.…”
    Conference item
  8. 8

    The future of event-level information repositories, indexing, and selection in ATLAS by Barberis, D, Cranshaw, J, Dimitrov, G, Doherty, T, Gallas, E, Hrivnac, J, Malon, D, Nairz, A, Nowak, M, Quilty, D, Sorokoletov, R, Gemmeren, P, Zhang, Q

    Published 2014
    “…This unique resource has been employed for a range of purposes, from monitoring, statistics, anomaly detection, and integrity checking, to event picking, subset selection, and sample extraction. …”
    Conference item
  9. 9

    Interpretable stability bounds for spectral graph filters by Kenlay, H, Thanou, D, Dong, X

    Published 2021
    “…As a ubiquitous tool to process graph-structured data, spectral graph filters have been used to solve common tasks such as denoising and anomaly detection, as well as design deep learning architectures such as graph neural networks. …”
    Conference item
  10. 10

    Reflecting on the use of sonification for network monitoring by Axon, L, Creese, S, Goldsmith, M, Nurse, J

    Published 2016
    “…In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. …”
    Conference item
  11. 11

    On detecting deception in space situational awareness by Pavur, J, Martinovic, I

    Published 2021
    “…We further develop and evaluate a machine-learning based anomaly detection tool which allows defenders to detect 90-98% of deception attempts with little to no in-house astrometry hardware. …”
    Conference item
  12. 12

    Leveraging the urban soundscape: Auditory perception for smart vehicles by Marchegiani, L, Posner, H

    Published 2017
    “…We first model the urban soundscape and use anomaly detection to identify the presence of an anomalous sound, and later determine the nature of this sound. …”
    Conference item
  13. 13

    On identifying anomalies in Tor usage with applications in detecting internet censorship by Wright, J, Darer, A, Farnan, O

    Published 2018
    “…We demonstrate the our approach in comparison to existing anomaly detection tools, and against both known historical internet censorship events and synthetic datasets. …”
    Conference item