-
1
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Conference or Workshop Item -
2
Anomaly detection for controlling data accruracy in service industry
Published 2013“…The purpose of this project is to investigate the application of anomaly detection, particularly control charts for individual sample, to control data quality of a risk management system in a financial industry. …”
Thesis -
3
Anomaly detection for controlling data accuracy in service industry
Published 2013“…The purpose of this project is to investigate the application of anomaly detection, particularly control charts for individual sample, to control data quality of a risk management system in a financial industry. …”
Get full text
Thesis -
4
Adaptive and online data anomaly detection for wireless sensor systems
Published 2014“…In this paper, two efficient and effective anomaly detection models PCCAD and APCCAD are proposed for static and dynamic environments, respectively. …”
Article -
5
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Conference or Workshop Item -
6
To identify suspicious activity in anomaly detection based on soft computing
Published 2006“…Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.…”
Conference or Workshop Item -
7
Unsupervised anomaly detection for unlabelled wireless sensor networks data
Published 2018“…Therefore, this paper will use the unsupervised one-class SVM (OCSVM) to build the anomaly detection schemes for better decision making. Unsupervised OCSVM is preferable to be used in WSNs domain due to the one class of data training is used to build normal reference model. …”
Get full text
Article -
8
Distributed CESVM-DR anomaly detection for wireless sensor network
Published 2019“…Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.…”
Get full text
Article -
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. Misuse detection algorithms model know attack behavior. …”
Monograph -
10
Anomaly detection in the temperature of an AC motor using embedded machine learning
Published 2023Get full text
Article -
11
An anti virus scheme using digital signature and anomaly detection techniques
Published 2003“…The scheme comprises two layers of protection, where the first layer implements digital signature technique while the second layer implements anomaly detection technique. In the scheme, newly downloaded files that have been digitally signed using SHA-l and RSA algorithms are verified at the first layer. …”
Get full text
Thesis -
12
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
Published 2020“…The objective of this study is to analyze relevant and significant features of huge network traffic to be used to improve the accuracy of traffic anomaly detection and to decrease its execution time. Information Gain is the most feature selection technique used in Intrusion Detection System (IDS) research. …”
Get full text
Article -
13
Real valued negative selection for anomaly detection in wireless ad hoc networks
Published 2004“…To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network.…”
Get full text
Conference or Workshop Item -
14
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005Get full text
Article -
15
Improving the anomaly detection by combining PSO search methods and J48 algorithm
Published 2020“…Compared with the previous study the proposed technique has better accuracy, TPR, and FPR.Anomaly Detection, CICIDS2017…”
Conference or Workshop Item -
16
Long short-term memory autoencoder-based anomaly detection system for electric motors
Published 2022“…Based on the experimental results, as the simulated defect worsened, the rate of anomalies detected by the system increased, with the maximum anomaly rate reaching 7 anomalies per second. …”
Get full text
Thesis -
17
Distributed anomaly detection scheme based on lightweight data aggregation in wireless sensor network
Published 2022“…Lastly, enhancing the efficiency and effectiveness of the anomaly detection scheme by designing the distributed anomaly detection scheme (DCESVM-DR). …”
Get full text
Thesis -
18
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
Published 2004“…Thus, the purpose of this method is to minimize the curve-fitting error on self-similarity measurement and detection loss probability in anomaly detection. This iterative method was applied to network traffic data provided by Lincoln Lab, Massachuset Institute of Technology (MIT). …”
Article -
19
A review of anomaly detection techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN)
Published 2018“…This research explains DDoS attacks and the anomaly detection as one of the famous detection techniques for intelligent networks.…”
Article -
20