Results 61 to 70 of about 5,201 (163)

An Improved Forward-Looking Sonar 3D Visualization Scheme of Underwater Objects

open access: yesIEEE Access, 2019
This paper presents an improved scheme for forward-looking sonar (FLS) visualization, including an echo acquisition method, a global threshold based on local outlier factor and a reconstruction method.
Teng Zeng   +3 more
doaj   +1 more source

Physical Layer Detection of Malicious Relays in LTE-A Network Using Unsupervised Learning

open access: yesIEEE Access, 2020
For Long Term Evolution Advanced (LTE-A) network, although there exist many studies that focus on improving the performance with relays, security issues are often neglected.
Yeliz Yengi, Adnan Kavak, Huseyin Arslan
doaj   +1 more source

Autoencoders for strategic decision support

open access: yes, 2020
In the majority of executive domains, a notion of normality is involved in most strategic decisions. However, few data-driven tools that support strategic decision-making are available.
Baesens, Bart   +4 more
core  

A taxonomy framework for unsupervised outlier detection techniques for multi-type data sets [PDF]

open access: yes, 2007
The term "outlier" can generally be defined as an observation that is significantly different from the other values in a data set. The outliers may be instances of error or indicate events.
Havinga, P.J.M.   +2 more
core   +1 more source

Supervised detection of anomalous light-curves in massive astronomical catalogs

open access: yes, 2014
The development of synoptic sky surveys has led to a massive amount of data for which resources needed for analysis are beyond human capabilities. To process this information and to extract all possible knowledge, machine learning techniques become ...
Kim, Dae-Won   +3 more
core   +1 more source

Event Log Correlation for Multi‐Step Attack Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat   +2 more
wiley   +1 more source

Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
This study presents a comparative evaluation of supervised and unsupervised learning models for anomaly detection in industrial control systems (ICS), using data from the SWaT testbed. Results show that although supervised models offer higher precision, they miss more unknown attacks, whereas unsupervised models achieve better recall but with increased
Zequn Wang   +4 more
wiley   +1 more source

FedAnomDetect a Clustered Federated Learning Framework for Robust Anomaly Detection With Enhanced Privacy and Communication Efficiency

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley   +1 more source

HLoOP—Hyperbolic 2-Space Local Outlier Probabilities

open access: yesIEEE Access
Hyperbolic geometry has recently garnered considerable attention in machine learning due to its ability to embed hierarchical graph structures with low distortions for further downstream processing.
Clemence Allietta   +3 more
doaj   +1 more source

‘Arithmetic Does not Deal With All the Factors’: How and Why Communities ‘Take Over’ Their NHS Hospital When Faced With Closure

open access: yesHealth &Social Care in the Community, Volume 2026, Issue 1, 2026.
Since 1984, at least 11 hospitals have left NHS England to return to charitable control. This paper examines how and why these transfers took place, based on an analysis of political records, campaign materials and news coverage. Each of these voluntary takeovers was the outcome of lengthy community‐led campaigns against the permanent closure of the ...
Steph Haydon, John Mohan, Hannah Wesley
wiley   +1 more source

Home - About - Disclaimer - Privacy