Showing 1 - 20 results of 30 for search '"anomaly detection"', query time: 0.08s Refine Results
  1. 1
  2. 2

    Anomaly detection for industrial big data by Caithness, N, Wallom, D

    Published 2018
    “…Here we present a prototype technique for data-driven anomaly detection to operate at industrial scale. The method generalizes to application with almost any multivariate dataset based on independent ordinations of repeated (bootstrapped) partitions of the dataset and inspection of the joint distribution of ordinal distances.…”
    Journal article
  3. 3

    An assessment of anomaly detection methods applied to microtunnelling by Sheil, B, Suryasentana, S, Cheng, W-C

    Published 2020
    “…The proliferation of data collected by modern tunnel boring machines presents a substantial opportunity for the application of data-driven anomaly detection (AD) techniques that can adapt dynamically to site specific conditions. …”
    Journal article
  4. 4

    Anomaly detection using pattern-of-life visual metaphors by Happa, J, Bashford-Rogers, T, Agrafiotis, I, Goldsmith, M, Creese, S

    Published 2019
    “…Similar to other anomaly-detection techniques, false positives do exist in our general approach as well. …”
    Journal article
  5. 5
  6. 6

    Modeling Advanced Persistent Threats to enhance anomaly detection techniques by Atapour, C, Agrafiotis, I, Creese, S

    Published 2018
    “…We find that attributes from the Command and Control phase of these attacks provide unique features that can be used by any anomaly detection systems. We further validate how expressive our abstract models are by formalizing a fifth APT and examining the behavior that was not captured.…”
    Journal article
  7. 7

    Early warning systems for malaria outbreaks in Thailand: an anomaly detection approach by Srimokla, O, Pan-ngum, W, Khamsiriwatchara, A, Padungtod, C, Tipmontree, R, Choosri, N, Saralamba, S

    Published 2024
    “…In this study, an anomaly detection system is introduced as an early warning mechanism for potential malaria outbreaks in countries like Thailand.…”
    Journal article
  8. 8

    Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection by Higgins, M, Stephen, B, Wallom, D

    Published 2023
    “…The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. …”
    Journal article
  9. 9

    Insider-threat detection using Gaussian mixture models and sensitivity profiles by Al Tabash, K, Happa, J

    Published 2018
    “…This paper introduces a novel automated anomaly detection method that uses Gaussian Mixture Models for modelling the normal behaviour of employees to detect anomalous behaviour that may be malicious. …”
    Journal article
  10. 10

    First- to second-language reading comprehension: not transfer, but access by Walter, C

    Published 2007
    “…To examine whether the SBF predicts L2 readers’ performance, two groups of French learners of English performed an anomaly detection task. Results corresponded to the predictions of the SBF. …”
    Journal article
  11. 11

    Prediction of microtunnelling jacking forces using a probabilistic observational approach by Sheil, B

    Published 2020
    “…The ability to predict the total jacking force requirements during a drive is highly desirable for anomaly detection, to ensure the available thrust is not exceeded, and to prevent damage to the pipe string and/or launch shaft. …”
    Journal article
  12. 12

    In-network machine learning using programmable network devices: a survey by Zheng, C, Hong, X, Ding, D, Vargaftik, S, Ben-Itzhak, Y, Zilberman, N

    Published 2023
    “…Machine learning is widely used to solve networking challenges, ranging from traffic classification and anomaly detection to network configuration. However, machine learning also requires significant processing and often increases the load on both networks and servers. …”
    Journal article
  13. 13

    Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations by Erola, A, Agrafiotis, I, Goldsmith, M, Creese, S

    Published 2022
    “…In order to fill this gap, we collaborated with three multinational commercial organisations who trialled our anomaly detection system, and worked with us to understand performance constraints for insider threat detection deployment and innate weaknesses in their operational contexts. …”
    Journal article
  14. 14

    Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme env... by Radanliev, P, De Roure, D, Page, K, Van Kleek, M, Santos, O, Maddox, L, Burnap, P, Anthi, E, Maple, C

    Published 2021
    “…The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. …”
    Journal article
  15. 15

    Scores for multivariate distributions and level sets by Meng, X, Taylor, J, Ben Taieb, S, Li, S

    Published 2023
    “…In some multivariate contexts, it is a forecast of a level set that is needed, such as a density level set for anomaly detection or the level set of the cumulative distribution as a measure of risk. …”
    Journal article
  16. 16

    A unique, ring-like radio source with quadrilateral structure detected with machine learning by Lochner, M, Rudnick, L, Heywood, I, Knowles, K, Shabala, SS

    Published 2023
    “…<p>We report the discovery of a unique object in the MeerKAT Galaxy Cluster Legacy Survey (MGCLS) using the machine learning anomaly detection framework ASTRONOMALY. This strange, ring-like source is 30′ from the MGCLS field centred on Abell 209, and is not readily explained by simple physical models. …”
    Journal article
  17. 17

    A Bayesian approach to insider threat detection by Wall, A, Agrafiotis, I

    Published 2021
    “…The majority of proposed models for insider threat anomaly detection, mainly focus on processing network data. …”
    Journal article
  18. 18

    A formalised approach to designing sonification systems for network-security monitoring by Axon, L, Nurse, J, Goldsmith, M, Creese, S

    Published 2017
    “…Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. …”
    Journal article
  19. 19

    Distributed inference condition monitoring system for rural infrastructure in the developing world by Greeff, H, Manandhar, A, Thomson, P, Hope, R, Clifton, D

    Published 2018
    “…This novel method has proven that it is possible for rural operating, resource-constrained devices to use lightweight, on-board machine learning approaches to perform anomaly detection in the embedded system. Distributed inference between the embedded system at the rural node and powerful cloud-based machine learning algorithms offer robust information without the need for expensive hardware or sensors embedded in situ – making the possibility of a large-scale (and perhaps even continent-wide) monitoring system feasible.…”
    Journal article
  20. 20

    Local2Global: a distributed approach for scaling representation learning on graphs by Jeub, LGS, Colavizza, G, Dong, X, Bazzi, M, Cucuringu, M

    Published 2023
    “…We also consider the downstream task of anomaly detection and show how one can use <i>local2global</i> to highlight anomalies in cybersecurity networks.…”
    Journal article