Showing 1 - 20 results of 50 for search '"anomaly detection"', query time: 0.08s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Anomaly detection for industrial big data by Caithness, N, Wallom, D

    Published 2018
    “…Here we present a prototype technique for data-driven anomaly detection to operate at industrial scale. The method generalizes to application with almost any multivariate dataset based on independent ordinations of repeated (bootstrapped) partitions of the dataset and inspection of the joint distribution of ordinal distances.…”
    Journal article
  5. 5

    An assessment of anomaly detection methods applied to microtunnelling by Sheil, B, Suryasentana, S, Cheng, W-C

    Published 2020
    “…The proliferation of data collected by modern tunnel boring machines presents a substantial opportunity for the application of data-driven anomaly detection (AD) techniques that can adapt dynamically to site specific conditions. …”
    Journal article
  6. 6
  7. 7

    Anomaly detection using pattern-of-life visual metaphors by Happa, J, Bashford-Rogers, T, Agrafiotis, I, Goldsmith, M, Creese, S

    Published 2019
    “…Similar to other anomaly-detection techniques, false positives do exist in our general approach as well. …”
    Journal article
  8. 8

    Anomaly detection in networks with application to financial transaction networks by Elliott, A, Cucuringu, M, Luaces, M, Reidy, P, Reinert, G

    Published 2019
    “…We compare our method with Oddball, a widely used method for anomaly detection in networks, as well as to random classification. …”
    Working paper
  9. 9
  10. 10

    Modeling Advanced Persistent Threats to enhance anomaly detection techniques by Atapour, C, Agrafiotis, I, Creese, S

    Published 2018
    “…We find that attributes from the Command and Control phase of these attacks provide unique features that can be used by any anomaly detection systems. We further validate how expressive our abstract models are by formalizing a fifth APT and examining the behavior that was not captured.…”
    Journal article
  11. 11

    Early warning systems for malaria outbreaks in Thailand: an anomaly detection approach by Srimokla, O, Pan-ngum, W, Khamsiriwatchara, A, Padungtod, C, Tipmontree, R, Choosri, N, Saralamba, S

    Published 2024
    “…In this study, an anomaly detection system is introduced as an early warning mechanism for potential malaria outbreaks in countries like Thailand.…”
    Journal article
  12. 12

    Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection by Higgins, M, Stephen, B, Wallom, D

    Published 2023
    “…The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. …”
    Journal article
  13. 13

    A state machine system for insider threat detection by Zhang, H, Agrafiotis, I, Erola, A, Creese, S, Goldsmith, M

    Published 2019
    “…Research has focused on providing rule-based detection systems or anomaly detection tools which use features indicative of malicious insider activity. …”
    Conference item
  14. 14

    Insider-threat detection using Gaussian mixture models and sensitivity profiles by Al Tabash, K, Happa, J

    Published 2018
    “…This paper introduces a novel automated anomaly detection method that uses Gaussian Mixture Models for modelling the normal behaviour of employees to detect anomalous behaviour that may be malicious. …”
    Journal article
  15. 15

    Intrusion detection for airborne communication using PHY-layer information by Strohmeier, M, Lenders, V, Martinovic, I

    Published 2015
    “…Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.…”
    Conference item
  16. 16

    Intrusion detection for airborne communication using PHY-layer information by Strohmeier, M, Lenders, V, Martinovic, I

    Published 2015
    “…Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.…”
    Conference item
  17. 17

    BRUNO: A deep recurrent model for exchangeable data by Korshunova, I, Degrave, J, Huszár, F, Gal, Y, Gretton, A, Dambre, J

    Published 2018
    “…The advantages of our architecture are demonstrated on learning tasks that require generalisation from short observed sequences while modelling sequence variability, such as conditional image generation, few-shot learning, and anomaly detection.…”
    Conference item
  18. 18

    Improving representation learning through variational autoencoding by Lin, S

    Published 2022
    “…Firstly, we show that a VAE's ability to compress complicated, high-dimensional data is key to achieving good performance in anomaly detection. We design a VAE-LSTM anomaly detection system that can accurately identify anomalous effects in a time serious. …”
    Thesis
  19. 19

    A Tripwire Grammar for Insider Threat Detection by Agrafiotis, I, Erola, A, Goldsmith, M, Creese, S

    Published 2016
    “…We then orchestrate these tripwires in conjunction with an anomaly detection system and present an approach to formalising tripwires of both categories. …”
    Conference item
  20. 20

    Learning retrospective knowledge with reverse reinforcement learning by Zhang, S, Veeriah, V, Whiteson, S

    Published 2020
    “…We demonstrate empirically the utility of Reverse GVFs in both representation learning and anomaly detection.…”
    Conference item