Works matching DE "ANOMALY detection (Computer security)"
Results: 2346
AN ANOMALY OF AN ANOMALY: INVESTIGATING THE CORTICAL ELECTROPHYSIOLOGY OF REMOTE STARING DETECTION.
- Published in:
- Journal of Parapsychology, 2013, v. 77, n. 1, p. 107
- By:
- Publication type:
- Article
Detecting anomalous behavior in sea traffic: A study of analytical strategies and their implications for surveillance systems.
- Published in:
- International Journal of Information Technology & Decision Making, 2014, v. 13, n. 2, p. 317, doi. 10.1142/S021962201450045X
- By:
- Publication type:
- Article
UNSUPERVISED LEARNING BASED DISTRIBUTED DETECTION OF GLOBAL ANOMALIES.
- Published in:
- International Journal of Information Technology & Decision Making, 2010, v. 9, n. 6, p. 935, doi. 10.1142/S0219622010004172
- By:
- Publication type:
- Article
EDITOR'S INTRODUCTION.
- Published in:
- International Journal of Information Technology & Decision Making, 2010, v. 9, n. 6, p. 847, doi. 10.1142/S0219622010004184
- By:
- Publication type:
- Article
Anomaly detection with inexact labels.
- Published in:
- Machine Learning, 2020, v. 109, n. 8, p. 1617, doi. 10.1007/s10994-020-05880-w
- By:
- Publication type:
- Article
Analyzing business process anomalies using autoencoders.
- Published in:
- Machine Learning, 2018, v. 107, n. 11, p. 1875, doi. 10.1007/s10994-018-5702-8
- By:
- Publication type:
- Article
Constraint-based clustering selection.
- Published in:
- Machine Learning, 2017, v. 106, n. 9-10, p. 1497, doi. 10.1007/s10994-017-5643-7
- By:
- Publication type:
- Article
An expressive dissimilarity measure for relational clustering using neighbourhood trees.
- Published in:
- Machine Learning, 2017, v. 106, n. 9-10, p. 1523, doi. 10.1007/s10994-017-5644-6
- By:
- Publication type:
- Article
Weightless neural networks for open set recognition.
- Published in:
- Machine Learning, 2017, v. 106, n. 9-10, p. 1547, doi. 10.1007/s10994-017-5646-4
- By:
- Publication type:
- Article
Expected similarity estimation for large-scale batch and streaming anomaly detection.
- Published in:
- Machine Learning, 2016, v. 105, n. 3, p. 305, doi. 10.1007/s10994-016-5567-7
- By:
- Publication type:
- Article
Analysis of network traffic features for anomaly detection.
- Published in:
- Machine Learning, 2015, v. 101, n. 1-3, p. 59, doi. 10.1007/s10994-014-5473-9
- By:
- Publication type:
- Article
Increasing coverage to improve detection of network and host anomalies.
- Published in:
- Machine Learning, 2010, v. 79, n. 3, p. 307, doi. 10.1007/s10994-009-5145-3
- By:
- Publication type:
- Article
Finding anomalous periodic time series.
- Published in:
- Machine Learning, 2009, v. 74, n. 3, p. 281, doi. 10.1007/s10994-008-5093-3
- By:
- Publication type:
- Article
Development of a cyber physical production system framework for smart tool health management.
- Published in:
- Journal of Intelligent Manufacturing, 2024, v. 35, n. 7, p. 3037, doi. 10.1007/s10845-023-02192-3
- By:
- Publication type:
- Article
Anomaly detection in additive manufacturing processes using supervised classification with imbalanced sensor data based on generative adversarial network.
- Published in:
- Journal of Intelligent Manufacturing, 2024, v. 35, n. 5, p. 2387, doi. 10.1007/s10845-023-02163-8
- By:
- Publication type:
- Article
Weakly supervised anomaly detection with multi-level contextual modeling.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 4, p. 2153, doi. 10.1007/s00530-023-01093-y
- By:
- Publication type:
- Article
Dual-branch network with memory for video anomaly detection.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 1, p. 247, doi. 10.1007/s00530-022-00991-x
- By:
- Publication type:
- Article
Deep learning methods for anomalies detection in social networks using multidimensional networks and multimodal data: a survey.
- Published in:
- Multimedia Systems, 2022, v. 28, n. 6, p. 2133, doi. 10.1007/s00530-020-00731-z
- By:
- Publication type:
- Article
Predicting skeleton trajectories using a Skeleton-Transformer for video anomaly detection.
- Published in:
- Multimedia Systems, 2022, v. 28, n. 4, p. 1481, doi. 10.1007/s00530-022-00915-9
- By:
- Publication type:
- Article
Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 4, p. 1841, doi. 10.1007/s11277-018-5721-6
- By:
- Publication type:
- Article
A Lightweight Anomaly Detection Method Based on SVDD for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 4, p. 1235, doi. 10.1007/s11277-019-06143-1
- By:
- Publication type:
- Article
Entropy-Based Anomaly Detection in a Network.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 4, p. 1487, doi. 10.1007/s11277-018-5288-2
- By:
- Publication type:
- Article
A Novel Anomaly Detection Algorithm Using DBSCAN and SVM in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 2, p. 2025, doi. 10.1007/s11277-017-4961-1
- By:
- Publication type:
- Article
An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2693, doi. 10.1007/s11277-017-4320-2
- By:
- Publication type:
- Article
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 497, doi. 10.1007/s11277-015-3128-1
- By:
- Publication type:
- Article
Wireless Rogue Access Point Detection Using Shadow Honeynet.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 1, p. 551, doi. 10.1007/s11277-015-2408-0
- By:
- Publication type:
- Article
Neural network computation with DNA strand displacement cascades.
- Published in:
- Nature, 2011, v. 475, n. 7356, p. 368, doi. 10.1038/nature10262
- By:
- Publication type:
- Article
Image-based and risk-informed detection of Subsea Pipeline damage.
- Published in:
- Discover Artificial Intelligence, 2023, v. 3, n. 1, p. 1, doi. 10.1007/s44163-023-00069-1
- By:
- Publication type:
- Article
Hyperspectral anomaly detection based on the weakly supervised robust autoencoder.
- Published in:
- Remote Sensing for Natural Resources, 2023, v. 35, n. 2, p. 167, doi. 10.6046/zrzyyg.2022093
- By:
- Publication type:
- Article
Optimizing Identity and Access Management through 1D-SCNN-Based Anomaly Detection.
- Published in:
- Journal of Applied Research on Industrial Engineering, 2024, v. 11, n. 4, p. 574, doi. 10.22105/jarie.2024.472705.1657
- By:
- Publication type:
- Article
Performance-Critical Anomaly Detection -- United States, December 2002-March 2004.
- Published in:
- MMWR: Morbidity & Mortality Weekly Report, 2005, v. 54, p. 188
- By:
- Publication type:
- Article
Spiking Neurons with Neural Dynamics Implemented Using Stochastic Memristors.
- Published in:
- Advanced Electronic Materials, 2024, v. 10, n. 1, p. 1, doi. 10.1002/aelm.202300564
- By:
- Publication type:
- Article
A study of the effect of deep cascade network on anomaly detection using optical flow as a high-level additional signal.
- Published in:
- Computational Intelligence in Electrical Engineering, 2024, v. 14, n. 4, p. 17, doi. 10.22108/ISEE.2023.135667.1596
- By:
- Publication type:
- Article
A Drift-Aware Online Learner for Anomaly Detection from Streaming Data.
- Published in:
- Computational Intelligence in Electrical Engineering, 2023, v. 13, n. 4, p. 1, doi. 10.22108/isee.2021.126591.1443
- By:
- Publication type:
- Article
Cybersecurity Advancements: A Comprehensive Survey of Machine Learning-based Preprocessing Techniques for Enhanced Website Phishing Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3453
- By:
- Publication type:
- Article
Kafka-based Intrusion Detection System.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1427
- By:
- Publication type:
- Article
Evaluation of Data Mining Classification Algorithm by Monitoring Fall Detection Anomaly using Discriminative Approach.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 262
- By:
- Publication type:
- Article
An IDS in Cloud Environment by using Feature Selection based Hybrid Multilevel Classifier.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2022, v. 8, n. 1, p. 381
- By:
- Publication type:
- Article
Detection of Oddity using User Behavior Patterns and Home Conditions for Home Automation of IOT Devices.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2021, v. 7, n. 1, p. 868
- By:
- Publication type:
- Article
Anomaly Detection of Computer Networks using Deep Learning Techniques.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2020, v. 6, n. 1, p. 126
- By:
- Publication type:
- Article
D-Manager.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 202
- By:
- Publication type:
- Article
An Improvement of Intrusion Attack Categorization and Recognition System.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 112
- By:
- Publication type:
- Article
Multi-Scale Temporal Convolutional Networks and Multi-Head Attention for Robust Log Anomaly Detection.
- Published in:
- Information Technology & Control, 2024, v. 53, n. 3, p. 813, doi. 10.5755/j01.itc.53.3.35704
- By:
- Publication type:
- Article
Effect Analysis of Malicious Flow Classification Model Based on Representation Learning on Network Flow Anomaly Detection.
- Published in:
- Information Technology & Control, 2024, v. 53, n. 3, p. 978, doi. 10.5755/j01.itc.53.3.34856
- By:
- Publication type:
- Article
Efficient Guided Grad-CAM Tuned Patch Neural Network for Accurate Anomaly Detection in Full Images.
- Published in:
- Information Technology & Control, 2024, v. 53, n. 2, p. 355, doi. 10.5755/j01.itc.53.2.34525
- By:
- Publication type:
- Article
Unsupervised Anomaly Detection of Industrial Images Based on Dual Generator Reconstruction Networks.
- Published in:
- Information Technology & Control, 2024, v. 53, n. 2, p. 331, doi. 10.5755/j01.itc.53.2.36018
- By:
- Publication type:
- Article
An Anomaly Detection Approach Based on Bidirectional Temporal Convolutional Network and Multi-Head Attention Mechanism.
- Published in:
- Information Technology & Control, 2024, v. 53, n. 1, p. 37, doi. 10.5755/j01.itc.53.1.34254
- By:
- Publication type:
- Article
波段选择协同表达高光谱异常探测算法.
- Published in:
- Journal of Remote Sensing, 2020, v. 24, n. 4, p. 427, doi. 10.11834/jrs.20209187
- By:
- Publication type:
- Article
独立成分分析的高光谱异常变化检测.
- Published in:
- Journal of Remote Sensing, 2019, v. 23, n. 6, p. 1167, doi. 10.11834/jrs.20198118
- By:
- Publication type:
- Article
显著性权重RX高光谱异常点检测.
- Published in:
- Journal of Remote Sensing, 2019, v. 23, n. 3, p. 418, doi. 10.11834/jrs.20197074
- By:
- Publication type:
- Article