Results 41 to 50 of about 5,452,269 (307)

Multivariate Time Series Anomaly Detection Algorithm in Missing Value Scenario [PDF]

open access: yesJisuanji kexue
Time series anomaly detection is an important research field in industry.Current methods of time series anomaly detection focus on anomaly detection for complete time series data,without considering the time series anomaly detection task containing ...
ZENG Zihui, LI Chaoyang, LIAO Qing
doaj   +1 more source

Influence of Features on Accuracy of Anomaly Detection for an Energy Trading System

open access: yesSensors, 2021
The biggest problem with conventional anomaly signal detection using features was that it was difficult to use it in real time and it requires processing of network signals.
Hoon Ko, Kwangcheol Rim, Isabel Praça
doaj   +1 more source

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection [PDF]

open access: yes, 2012
Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining ...
David J. Day   +2 more
core   +2 more sources

Generative Cooperative Learning for Unsupervised Video Anomaly Detection [PDF]

open access: yesComputer Vision and Pattern Recognition, 2022
Video anomaly detection is well investigated in weakly-supervised and one-class classification (OCC) settings. However, unsupervised video anomaly detection methods are quite sparse, likely because anomalies are less frequent in occurrence and usually ...
M. Zaheer   +5 more
semanticscholar   +1 more source

A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks

open access: yesSensors, 2023
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly detection (AD). With the rapid increase in the number of Internet-connected devices, the growing desire for Internet of Things (IoT) devices in the home, on our ...
Kyle DeMedeiros   +2 more
doaj   +1 more source

E-SFD: Explainable Sensor Fault Detection in the ICS Anomaly Detection System

open access: yesIEEE Access, 2021
Industrial Control Systems (ICS) are evolving into smart environments with increased interconnectivity by being connected to the Internet. These changes increase the likelihood of security vulnerabilities and accidents. As the risk of cyberattacks on ICS
Chanwoong Hwang, Taejin Lee
doaj   +1 more source

Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern

open access: yesInformation, 2019
Anomaly detection of network traffic flows is a non-trivial problem in the field of network security due to the complexity of network traffic. However, most machine learning-based detection methods focus on network anomaly detection but ignore the user ...
Ying Zhao   +6 more
doaj   +1 more source

Machine Learning for Anomaly Detection: A Systematic Review

open access: yesIEEE Access, 2021
Anomaly detection has been used for decades to identify and extract anomalous components from data. Many techniques have been used to detect anomalies. One of the increasingly significant techniques is Machine Learning (ML), which plays an important role
Ali Bou Nassif   +3 more
doaj   +1 more source

Machine Learning-Driven Predictive Analytics for Real-Time Supply Chain Risk Management

open access: yesProceedings of the International Conference on Applied Innovations in IT
A resilient and efficient supply chain requires real-time risk management in an increasingly volatile global marketplace. This study examines a supply chain risk management system based on machine learning-driven prediction analytics.
Nagham Ja’far Hussein   +1 more
doaj   +1 more source

Conflict-driven Hybrid Observer-based Anomaly Detection

open access: yes, 2017
This paper presents an anomaly detection method using a hybrid observer -- which consists of a discrete state observer and a continuous state observer. We focus our attention on anomalies caused by intelligent attacks, which may bypass existing anomaly ...
balluchi   +10 more
core   +1 more source

Home - About - Disclaimer - Privacy