نتایج جستجو برای: anomaly detection

تعداد نتایج: 591345  

2000
L. Bonora

We deal with the problem of diffeomorphism anomaly in theories with branes. In particular we thoroughly analyze the problem of the residual chiral anomaly of a five–brane immersed in M–theory, paying attention to its global formulation in the five–brane world–volume. We conclude that the anomaly can be canceled by a local counterterm in the five–brane world–volume.

1996
P. Binétruy G. Dvali

We show that inflation which is dominated by the D-term density avoids the 'slow-roll' problem of inflation in supergravity. Such an inflationary scenario can naturally emerge in theories with non-anomalous or anomalous U(1) gauge symmetry. In the latter case the scale of inflation is fixed by the Green–Schwarz mechanism of anomaly cancellation. The crucial point is that the (super)gravity-medi...

Journal: :JSW 2010
Sheng Sun Yuanzhen Wang

Anomaly detection approaches build models of normal data and detect deviations from the normal model in observed data. Anomaly detection applied to intrusion detection and computer security has been an active area of research. The major benefit of anomaly detection algorithms is their ability to potentially detect unforeseen attacks. In this paper, a novel weighted support vector clustering alg...

2005
Kingsly Leung Christopher Leckie

Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labeled training data. This training data is 90 typically expensive to produce. Moreover, these methods have difficulty in detecting new types of attack. In this paper, we have discussed anomaly based instruction detection, pros and cons of anomaly detection, supervised and...

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

Journal: :Journal of global tourism research 2021

Journal: :IEEE Transactions on Geoscience and Remote Sensing 2022

A known target detection assumes that the to be detected is provided a priori , while an anomaly unknown without any prior knowledge. As a result, generally performs search-before-detect in active mode, referred as opposed which throw-before-detect passive detection. Accordingly, techniques des...

2015

Anomaly Detection of Web-based Attacks. Christopher Kruegel chriscs.ucsb.edu. Giovanni Vigna vignacs.ucsb.edu. University of.Using Generalization and Characterization Techniques in the. Anomaly-based Detection of Web Attacks. William Robertson, Giovanni Vigna, Christopher.tem that detects web-based attacks using a number of different techniques. The anomaly detection system takes as input web s...

Journal: :journal of advances in computer research 2013
yazdan jamshidi hossein nezamabadi-pour

as networking and communication technology becomes more widespread, thequantity and impact of system attackers have been increased rapidly. themethodology of intrusion detection (ids) is generally classified into two broadcategories according to the detection approaches: misuse detection and anomalydetection. in misuse detection approach, abnormal system behavior is defined atfirst, and then an...

2011
Dennis Ippoliti Xiaobo Zhou Edward Chow Chuan Yue

Anomaly detection is a challenging problem that has been researched within a variety of application domains such as image processing, fault isolation, fraud detection, and network intrusion detection. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the spec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید