Showing 141 - 160 results of 2,983 for search '"anomaly detection"', query time: 0.14s Refine Results
  1. 141

    Hyperspectral Anomaly Detection with Auto-Encoder and Independent Target by Shuhan Chen, Xiaorun Li, Yunfeng Yan

    Published 2023-11-01
    “…Many AE-based background (BKG) modeling methods have been developed for hyperspectral anomaly detection (HAD). However, their performance is subject to their unbiased reconstruction of BKG and target pixels. …”
    Get full text
    Article
  2. 142

    Entropy-Based Anomaly Detection for Gaussian Mixture Modeling by Luca Scrucca

    Published 2023-04-01
    “…This latter aspect is crucial for anomaly detection in situations where a clear, early warning of an abnormal condition is required. …”
    Get full text
    Article
  3. 143
  4. 144
  5. 145

    Anomaly Detection Method of SDN Network Edge Switch by ZHAO Yang, YI Peng, ZHANG Zhen, HU Tao, LIU Shaoxun

    Published 2023-01-01
    “…Software-defined network gives programmability to the network,reduces the complexity of network management,and promotes the development of new network technology.As a device for data forwarding and policy enforcement,the permissions of SDN switches should not be stolen by unauthorized entities.However,the SDN switch does not always execute the commands issued by the controller.Malicious attackers attack the network covertly and fatally by eroding the SDN switch,which seriously affects the end-to-end communication quality of users.Communicationsequential process(CSP),as a modeling language designed for concurrent systems,can accurately describe the interaction between SDN switch-switch and switch-host.In this paper,CSP is used to model SDN switch and terminal host,and two abnormal switch location methods are analyzed theoretically.We verify the effectiveness of the two detection methods in the instantiated model system when the edge switch is maliciously forwarded as an egress switch,and the authentication results show that the abnormal behavior cannot be detected.In order to solve this problem,an anomaly detection method for edge switch is proposed in this paper.In this method,the host records the statistical information and triggers the packet_in message to complete the information transmission with the controller by constructing a special packet.The controller collects the statistical information and detects the abnormal forwarding behavior of the edge switch by analyzing the statistical information consistency between the edge switch and the host.Finally,based on the ryu controller,experiments are carried out on the mininet platform,and experimental results show that the edge switch anomaly detection method can successfully detect abnormal behavior.…”
    Get full text
    Article
  6. 146
  7. 147

    Network anomaly detection using deep learning techniques by Mohammad Kazim Hooshmand, Doreswamy Hosahalli

    Published 2022-06-01
    “…To transform this performance towards the task of network anomaly detection in cyber‐security, this study proposes a model using one‐dimensional CNN architecture. …”
    Get full text
    Article
  8. 148
  9. 149

    Comparing Autoencoder and Isolation Forest in Network Anomaly Detection by Timotej Smolen, Lenka Benova

    Published 2023-05-01
    Subjects: “…anomaly detection network traffic intrusion detection autoencoder isolation forest lstm unsupervised learning web server logs…”
    Get full text
    Article
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154

    Real‐time video anomaly detection for smart surveillance by Manal Mostafa Ali

    Published 2023-04-01
    Subjects: “…anomaly detection…”
    Get full text
    Article
  15. 155
  16. 156
  17. 157
  18. 158
  19. 159
  20. 160