نتایج جستجو برای: dynamic anomaly detection
تعداد نتایج: 978818 فیلتر نتایج به سال:
high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...
anomaly detection (ad) has recently become an important application of hyperspectral images analysis. the goal of these algorithms is to find the objects in the image scene which are anomalous in comparison to their surrounding background. one way to improve the performance and runtime of these algorithms is to use dimensionality reduction (dr) techniques. this paper evaluates the effect of thr...
As the dominator of the Smartphone operating system market, consequently android has attracted the attention of s malware authors and researcher alike. The number of types of android malware is increasing rapidly regardless of the considerable number of proposed malware analysis systems. In this paper, by taking advantages of low false-positive rate of misuse detection and the ability of anomal...
Motivated by the recent surge of criminal activities with cross-cryptocurrency trades, we introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks. We postulate that anomalies underlying blockchain transaction graph are composed multiple layers likely also be manifested anomalous patterns network shape properties. As such, invoke machinery clique pe...
To ensure the security and stabilization of communication networks, anomaly detection is first line defense. However, their learning process suffers two major issues: (1) inadequate labels: there are many different kinds attacks but rare abnormal nodes in mt these atstacks; (2) inaccurate considering heavy network flows new emerging attacks, providing accurate labels for all very expensive. The...
this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...
Anomaly detection is a challenging problem that has been researched within a variety of application domains such as image processing, fault isolation, fraud detection, and network intrusion detection. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the spec...
wireless sensor networks (wsns) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. however,security is a major challenge for wsns because they areusually setup in unprotected environments. our goal in thisstudy is to simulate an intrusion detection system (ids)that monitors the wsn and report intrusions accurately andeffectively. we have thus...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید