Showing 341 - 360 results of 2,983 for search '"anomaly detection"', query time: 0.17s Refine Results
  1. 341
  2. 342

    From soft sensing to anomaly detection in combined sewer systems by Palmitessa, Rocco

    Published 2021
    “…By investigating and testing updated 1D hydrodynamic models and LSTM neural networks, this thesis demonstrates their concrete potential for soft sensing and anomaly detection applications and promotes their integration in the monitoring and control workflows of modern utility companies.…”
    Get full text
    Thesis-Doctor of Philosophy
  3. 343
  4. 344

    Video anomaly detection using unsupervised deep learning methods by Yan, Mengjia

    Published 2018
    “…Video anomaly detection has played a significant role in computer vision and video surveillance tasks. …”
    Get full text
    Get full text
    Thesis
  5. 345
  6. 346

    Modeling Advanced Persistent Threats to enhance anomaly detection techniques by Atapour, C, Agrafiotis, I, Creese, S

    Published 2018
    “…We find that attributes from the Command and Control phase of these attacks provide unique features that can be used by any anomaly detection systems. We further validate how expressive our abstract models are by formalizing a fifth APT and examining the behavior that was not captured.…”
    Journal article
  7. 347

    A comparison of different technique in flow based anomaly detection by Salah, Mohammad

    Published 2017
    Subjects: “…Anomaly detection (Computer security)…”
    Get full text
    Thesis
  8. 348

    Adaptive and online data anomaly detection for wireless sensor systems by Rassam, Murad Abdo, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2014
    “…In this paper, two efficient and effective anomaly detection models PCCAD and APCCAD are proposed for static and dynamic environments, respectively. …”
    Article
  9. 349

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Conference or Workshop Item
  10. 350

    To identify suspicious activity in anomaly detection based on soft computing by Chimphlee, Witcha, Sap, M., Abdullah, Abdul Hanan, Chimphlee, Siriporn, Srinoy, Surat

    Published 2006
    “…Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.…”
    Conference or Workshop Item
  11. 351

    Unsupervised anomaly detection for unlabelled wireless sensor networks data by Mohd. Zamry, Nurfazrina, Zainal, Anazida, A. Rassam, Murad

    Published 2018
    “…Therefore, this paper will use the unsupervised one-class SVM (OCSVM) to build the anomaly detection schemes for better decision making. Unsupervised OCSVM is preferable to be used in WSNs domain due to the one class of data training is used to build normal reference model. …”
    Get full text
    Article
  12. 352

    Distributed CESVM-DR anomaly detection for wireless sensor network by Mohd. Zamry, Nurfazrina, Zainal, Anazida, A. Rassam, Murad

    Published 2019
    “…Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.…”
    Get full text
    Article
  13. 353

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. Misuse detection algorithms model know attack behavior. …”
    Monograph
  14. 354
  15. 355
  16. 356
  17. 357

    Anomaly Detection in Time Series Data Using Spiking Neural Network by Bariah, Yusob, Zuriani, Mustaffa, Junaida, Sulaiman

    Published 2018
    “…One of the crucial issues in anomaly detection problems is identifying abnormal patterns in time series data that contains noise and in unstructured form. …”
    Get full text
    Article
  18. 358
  19. 359
  20. 360