نتایج جستجو برای: dynamic anomaly detection

تعداد نتایج: 978818  

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

Journal: :journal of ai and data mining 2015
mohsen zare-baghbidi saeid homayouni kamal jamshidi a. r. naghsh-nilchi

anomaly detection (ad) has recently become an important application of hyperspectral images analysis. the goal of these algorithms is to find the objects in the image scene which are anomalous in comparison to their surrounding background. one way to improve the performance and runtime of these algorithms is to use dimensionality reduction (dr) techniques. this paper evaluates the effect of thr...

2015
Xiaolei Wang Yuexiang Yang Yingzhi Zeng

As the dominator of the Smartphone operating system market, consequently android has attracted the attention of s malware authors and researcher alike. The number of types of android malware is increasing rapidly regardless of the considerable number of proposed malware analysis systems. In this paper, by taking advantages of low false-positive rate of misuse detection and the ability of anomal...

Journal: :ACM Transactions on Internet Technology 2011

Journal: :Lecture Notes in Computer Science 2021

Motivated by the recent surge of criminal activities with cross-cryptocurrency trades, we introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks. We postulate that anomalies underlying blockchain transaction graph are composed multiple layers likely also be manifested anomalous patterns network shape properties. As such, invoke machinery clique pe...

Journal: :Information Sciences 2021

To ensure the security and stabilization of communication networks, anomaly detection is first line defense. However, their learning process suffers two major issues: (1) inadequate labels: there are many different kinds attacks but rare abnormal nodes in mt these atstacks; (2) inaccurate considering heavy network flows new emerging attacks, providing accurate labels for all very expensive. The...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...

2011
Dennis Ippoliti Xiaobo Zhou Edward Chow Chuan Yue

Anomaly detection is a challenging problem that has been researched within a variety of application domains such as image processing, fault isolation, fraud detection, and network intrusion detection. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the spec...

Journal: :international journal of communications and information technology 2011
o. adaobi m. ghassemian

wireless sensor networks (wsns) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. however,security is a major challenge for wsns because they areusually setup in unprotected environments. our goal in thisstudy is to simulate an intrusion detection system (ids)that monitors the wsn and report intrusions accurately andeffectively. we have thus...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید