Results 61 to 70 of about 5,201 (163)
An Improved Forward-Looking Sonar 3D Visualization Scheme of Underwater Objects
This paper presents an improved scheme for forward-looking sonar (FLS) visualization, including an echo acquisition method, a global threshold based on local outlier factor and a reconstruction method.
Teng Zeng +3 more
doaj +1 more source
Physical Layer Detection of Malicious Relays in LTE-A Network Using Unsupervised Learning
For Long Term Evolution Advanced (LTE-A) network, although there exist many studies that focus on improving the performance with relays, security issues are often neglected.
Yeliz Yengi, Adnan Kavak, Huseyin Arslan
doaj +1 more source
Autoencoders for strategic decision support
In the majority of executive domains, a notion of normality is involved in most strategic decisions. However, few data-driven tools that support strategic decision-making are available.
Baesens, Bart +4 more
core
A taxonomy framework for unsupervised outlier detection techniques for multi-type data sets [PDF]
The term "outlier" can generally be defined as an observation that is significantly different from the other values in a data set. The outliers may be instances of error or indicate events.
Havinga, P.J.M. +2 more
core +1 more source
Supervised detection of anomalous light-curves in massive astronomical catalogs
The development of synoptic sky surveys has led to a massive amount of data for which resources needed for analysis are beyond human capabilities. To process this information and to extract all possible knowledge, machine learning techniques become ...
Kim, Dae-Won +3 more
core +1 more source
Event Log Correlation for Multi‐Step Attack Detection
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat +2 more
wiley +1 more source
Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques
This study presents a comparative evaluation of supervised and unsupervised learning models for anomaly detection in industrial control systems (ICS), using data from the SWaT testbed. Results show that although supervised models offer higher precision, they miss more unknown attacks, whereas unsupervised models achieve better recall but with increased
Zequn Wang +4 more
wiley +1 more source
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley +1 more source
HLoOP—Hyperbolic 2-Space Local Outlier Probabilities
Hyperbolic geometry has recently garnered considerable attention in machine learning due to its ability to embed hierarchical graph structures with low distortions for further downstream processing.
Clemence Allietta +3 more
doaj +1 more source
Since 1984, at least 11 hospitals have left NHS England to return to charitable control. This paper examines how and why these transfers took place, based on an analysis of political records, campaign materials and news coverage. Each of these voluntary takeovers was the outcome of lengthy community‐led campaigns against the permanent closure of the ...
Steph Haydon, John Mohan, Hannah Wesley
wiley +1 more source

