Results 51 to 60 of about 307,816 (329)

Anomaly Detection for Bivariate Signals [PDF]

open access: yes, 2019
The anomaly detection problem for univariate or multivariate time series is a critical question in many practical applications as industrial processes control, biological measures, engine monitoring, supervision of all kinds of behavior. In this paper we propose a simple and empirical approach to detect anomalies in the behavior of multivariate time ...
Cottrell, Marie   +3 more
openaire   +5 more sources

Establishment and mapping of heterogeneous anomalies in network intrusion datasets

open access: yesConnection Science, 2022
Anomaly detection in the scope of network security aims to identify network instances for the unexpected and unique, with various security operations employing such techniques to facilitate effective threat detection.
Liam Riddell   +2 more
doaj   +1 more source

A Multi-Dimensional approach towards Intrusion Detection System

open access: yes, 2012
In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of ...
Sanyal, Sugata   +1 more
core   +3 more sources

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection

open access: yes, 2020
The need for countering Advanced Persistent Threat (APT) attacks has led to the solutions that ubiquitously monitor system activities in each enterprise host, and perform timely abnormal system behavior detection over the stream of monitoring data ...
Chen, Haifeng   +6 more
core   +1 more source

Online Video Anomaly Detection

open access: yesSensors, 2023
With the popularity of video surveillance technology, people are paying more and more attention to how to detect abnormal states or events in videos in time. Therefore, real-time, automatic and accurate detection of abnormal events has become the main goal of video-based surveillance systems.
Yuxing Zhang   +3 more
openaire   +3 more sources

An Adaptive Policy-Based Anomaly Object Control System for Enhanced Cybersecurity

open access: yesIEEE Access
Anomaly detection research focuses on identifying rare patterns derived from daily occurrences. This study introduces an innovative anomaly–object control system that utilizes adaptive policies through anomaly detection algorithms.
Won Sakong, Wooju Kim
doaj   +1 more source

Model selection for anomaly detection [PDF]

open access: yesSPIE Proceedings, 2015
6 pages, 3 figures, Eighth International Conference on Machine Vision (December 8, 2015)
Dmitry Smolyakov   +2 more
openaire   +4 more sources

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

open access: yes, 2016
In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system.
Abed, Amr S.   +2 more
core   +1 more source

Quantum machine learning for quantum anomaly detection

open access: yes, 2017
Anomaly detection is used for identifying data that deviate from `normal' data patterns. Its usage on classical data finds diverse applications in many important areas like fraud detection, medical diagnoses, data cleaning and surveillance.
Liu, Nana, Rebentrost, Patrick
core   +1 more source

Hybrid Discriminator With Correlative Autoencoder for Anomaly Detection

open access: yesIEEE Access, 2021
Advances in deep neural networks (DNNs) have led to impressive results and in recent years many works have exploited DNNs for anomaly detection. Among others, generative/reconstruction model-based methods have been frequently used for anomaly detection ...
Jungeon Lee   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy