نتایج جستجو برای: anomaly based detection

تعداد نتایج: 3344676  

Journal: :Appl. Soft Comput. 2010
Xin Xu

Anomaly detection is an important problem that has been popularly researched within diverse research areas and application domains. One of the open problems in anomaly detection is the modeling and prediction of complex sequential data, which consist of a series of temporally related behavior patterns. In this paper, a novel sequential anomaly detection method based on temporal-difference (TD) ...

Journal: :Lecture Notes in Computer Science 2022

AbstractAnomaly detection is the task of detecting outliers from normal data. Numerous methods have been proposed to address this problem, including recent based on generative adversarial network (GAN). However, these are limited in capturing long-range information data due receptive field obtained by convolution operation. The crucial for producing distinctive representation belonging differen...

2006
Yacine Bouzida Frédéric Cuppens

Signature based intrusion detection systems cannot detect new attacks. These systems are the most used and developed ones. Current anomaly based intrusion detection systems are also unable to detect all kinds of new attacks because they are designed to restricted applications on limited environment. Current hackers are using new attacks where neither preventive techniques mainly based on access...

Journal: :journal of mining and environment 2014
maysam abedi kiomars mosazadeh hamid dehghani ahmad madanchizare

we have applied an automatic interpretation method of potential data called an-eul in unexploded ordnance (uxo) prospective which is indeed a combination of the analytic signal and the euler deconvolution approaches. the method can be applied for both magnetic and gravity data as well for gradient surveys based upon the concept of the structural index (si) of a potential anomaly which is relate...

2012
M. Moorthy

ISSN 2250 – 110X | © 2011 Bonfring Abstract--The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networ...

Journal: :Ukrainian Scientific Journal of Information Security 2012

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2017

Journal: :International journal of artificial intelligence and machine learning 2021

Supervisory control and data acquisition (SCADA) systems are industrial that used to monitor critical infrastructures such as airports, transport, health, public services of national importance. These cyber physical systems, which increasingly integrated with networks internet things devices. However, this results in a larger attack surface for threats, making it important identify thwart cyber...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید