نتایج جستجو برای: dynamic anomaly detection

تعداد نتایج: 978818  

Journal: :EURASIP J. Wireless Comm. and Networking 2013
Wei Wang Dunqiang Lu Xin Zhou Baoju Zhang Jiasong Mu

Anomaly detection in big data is a key problem in the big data analytics domain. In this paper, the definitions of anomaly detection and big data were presented. Due to the sampling and storage burden and the inadequacy of privacy protection of anomaly detection based on uncompressed data, compressive sensing theory was introduced and used in the anomaly detection algorithm. The anomaly detecti...

2009
Stefan Theisen

We examine the Weyl anomaly for a four-dimensional z = 3 Lifshitz scalar coupled to Hořava’s theory of anisotropic gravity. We find a one-loop break-down of scale-invariance at second order in the gravitational background.

2011
Christoforos Panos Christos Xenakis Ioannis Stavrakakis

Mobile Ad Hoc Networks are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders. Anomaly-based detection engines are a topic of ongoing interest in the research community, due to their advantage in ...

Journal: :iranian journal of fuzzy systems 2013
mohammad rahmanimanesh saeed jalili

in this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (aodv) routing protocol is proposed. in the method, the required features for describing the normal behavior of aodv are defined via step by step analysis of aodv and independent of any attack. in order to learn the normal behavior of aodv, a fuzzy averaging method is used fo...

Journal: :CoRR 2017
Jian Xu Mandana Saebi Bruno Ribeiro Lance M. Kaplan Nitesh V. Chawla

Amajor branch of anomaly detection methods rely on dynamic networks: raw sequential data is first converted to a series of networks, then critical change points are identified in the evolving network structure. However, existing approaches use the first-order network (FON) to represent the underlying raw data, which may lose important higher-order sequence patterns, making higher-order anomalie...

Journal: :Concurrency and Computation: Practice and Experience 2017
Rodrigo N. Calheiros Kotagiri Ramamohanarao Rajkumar Buyya Christopher Leckie Steve Versteeg

1School of Computing, Engineering and Mathematics,Western Sydney University, Penrith, NSW, Australia 2School of Computing and Information Systems, The University ofMelbourne, Melbourne, VIC, Australia 3CA Technologies, Melbourne, VIC, Australia Correspondence Rodrigo N. Calheiros,Western Sydney University, Locked Bag 1797, Penrith, NSW 2751, Australia. Email: [email protected] Su...

Journal: :Journal of Ambient Intelligence and Humanized Computing 2018

Journal: :Energies 2022

The dynamic operation of power transmission systems requires the acquisition reliable and accurate measurement state information. use TCP/IP-based communication protocols such as IEEE C37.118 or IEC 61850 introduces different gateways to launch cyber-attacks compromise major system functionalities. Within this study, a combined network intrusion phasor data anomaly detection is proposed enable ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید