Results 11 to 20 of about 19,864 (168)
Blockchain network layer anomaly traffic detection method based on multiple classifier integration [PDF]
To improve the comprehensive generalized feature perception ability of mixed attack traffic on the blockchain network layer, and enhance the performance of abnormal traffic detection, a blockchain layer traffic anomaly detection method was proposed that ...
Bin ZHANG +3 more
core +1 more source
Port address overloading based packet forwarding verification in SDN [PDF]
Aiming at the problem that the existing forwarding verification mechanisms in software-defined networking (SDN) incur significant communication overhead caused by embedding additional packet fields, a packet forwarding verification mechanism based on ...
Chaowen CHANG, Ping WU, Yingying MA
core +1 more source
对卫星在轨状态进行实时监测和异常检测,有利于保障卫星安全稳定运行。为解决在利用聚类分析检测卫星异常过程中,通过网格搜索选择最佳聚类超参数时精细度差、效率低的问题,本文将聚类超参数选择转化为单目标优化问题,并基于智能优化算法的启发式搜索能力,提出了超参数自适应优化的聚类算法UMOEAsII_BIRCH。为验证自适应搜索的有效性,在卫星遥测数据集和公开数据集上进行了测试。以网格搜索为基准,分别选取基于划分、基于密度和基于层次的聚类算法,对比自适应搜索和网格搜索两种方式下,异常检测的F1 ...
赵 玉炜, 苏 举
doaj +1 more source
Integrated intrusion detection model based on rough set and artificial immune [PDF]
According to the problems of intrusion detection,an integrated intrusion detection model based on rough set and artificial immune (RSAI-IID) was proposed by using rough set and integrating misuse detection and anomaly detection.The rough set method was ...
Guan-ning CUI +5 more
core +1 more source
软件定义光网络(SDON)中,控制平面可能遭遇入侵威胁从而对网络的稳定可靠服务供给造成影响。文章针对SDON集中控制平面安全问题提出了一种基于机器学习的入侵检测策略,采用孤立森林算法来检测点异常,采用指数权重移动平均(EWMA)算法来检测序列异常。理论分析和仿真实验结果表明,所提的基于机器学习的SDON检测技术能够实现90%点异常检测准确率和85%序列异常检测准确率。
朱嘉豪 +5 more
doaj
Concept-Based Visual Analysis of Dynamic Textual Data
Analyzing how interrelated ideas flow within and between multiple social groups helps understand the propagation of information, ideas, and thoughts on social media.
Fangxin, Ouyang +2 more
core
Angle-based Graph Neural Network Method for Anomaly Detection in High Dimensional Data [PDF]
In high-dimensional data spaces, most data are located at the edges of the high-dimensional space and distributed sparsely, resulting in the problem of "curse of dimensionality", which makes existing anomaly detection methods unable to ensure ...
Jun WANG, Huixia LAI, Yue WAN, Shi ZHANG
core +1 more source
Research on Real-time Abnormal Detection of Network Traffic under The Big Data Environment [PDF]
随着互联网的快速发展,数据网规模不断扩大,基于数据网的各种应用业务也越来越广泛,对各大运营商以及业务数据量大的企业,在运维管理方面不得不投入了大量的人力与物力。在运维管理中,故障实时预警是最重要的一部分,快速并准确地预警故障,可以以最快的速度发现业务环境中的问题,从而及时地避免故障带来的严重损失。在大数据环境下,研究实时故障预警技术的理论和实现机制,在现实运维管理中有很大的实际意义。 其中流量实时预警是最重要的一个环节,通过流量的实时预警,可以很大程度反馈业务的故障。因此 ...
黄志敏
core
Weakly Supervised Video Anomaly Detection Method for Rope Skipping Combined with Semantic Prompts and Memory Enhancement [PDF]
The student evaluation enhancement platform collects millions of jump rope movement data points from primary and secondary school students for physical fitness assessment. However, in the collected jump rope videos, there are various abnormal videos that
Xuanyu ZHOU, Lianhua WU, Qinhua ZHENG, Tianxing XIAO, Zixuan WANG, Simin ZHANG
core +1 more source
Automating the analysis of public saliency and attitudes toward biodiversity from digital media
Abstract Measuring public attitudes toward wildlife provides crucial insights into human relationships with nature and helps monitor progress toward Global Biodiversity Framework targets. Yet, conducting such assessments at a global scale presents challenges.
Noah Giebink +8 more
wiley +1 more source

