• No results found

Detection and visualization:

Gas Leak Detection and Visualization.

Gas Leak Detection and Visualization.

... leak detection surveys by a method that is acceptable to the ...gas detection camera is permitted as an ‘Alternate Work Practice’ under Method 21 and is ...

46

Predictive Network Anomaly Detection and Visualization

Predictive Network Anomaly Detection and Visualization

... Hence, the definition of anomaly as a “variation from Gaussian density” also guides our analysis of false positives and false negatives. Since all anomalous traffic must be justified by network analysts, there is no false ...

12

Cyber Security Network Anomaly Detection and Visualization

Cyber Security Network Anomaly Detection and Visualization

... anomaly detection portion of this report completed, we then focused on the develop- ment of a novel visualization ...Our visualization system supports several goals related to anomaly ...a ...

72

SERG. Data Clone Detection and Visualization in Spreadsheets

SERG. Data Clone Detection and Visualization in Spreadsheets

... clone detection algorithm over the 1711 spreadsheet files in the EUSES corpus which contain formulas total took 3 hours, 49 minutes and 14 seconds (13,754 seconds in ...

14

GLTR: Statistical Detection and Visualization of Generated Text

GLTR: Statistical Detection and Visualization of Generated Text

... Abstract The rapid improvement of language models has raised the specter of abuse of text gen- eration systems. This progress motivates the development of simple methods for detecting generated text that can be used by ...

6

Cyber Security Network Anomaly Detection and Visualization

Cyber Security Network Anomaly Detection and Visualization

... anomaly detection into the visualization as well as feature ...anomaly detection involved, or for visualizing features for feature selection algorithm creation ...Intrusion Detection discussed ...

72

Detection and visualization of communities in mass spectrometry imaging data.

Detection and visualization of communities in mass spectrometry imaging data.

... community detection as an unsupervised clustering tech- nique for the analysis of MSI data from different types of ...community detection as an example to group molecules with similar lateral ...interactive ...

12

MTSAD: Multivariate Time Series Abnormality Detection and Visualization

MTSAD: Multivariate Time Series Abnormality Detection and Visualization

... B. Visualization components and interactions Figure 4 shows the main visualization components of our solution applied to a multivariate time series dataset collected from a high-performance computing center ...

10

In situ mutation detection and visualization of intratumor heterogeneity for cancer research and diagnostics

In situ mutation detection and visualization of intratumor heterogeneity for cancer research and diagnostics

... Current assays for somatic mutation analysis are based on extracts from tissue sections that often contain morphologically heterogeneous neoplastic regions with variable contents of genetically normal stromal and ...

12

External Detection and Visualization of Myocardial Ischemia with x ^-Substrates in Vitro and in Vivo

External Detection and Visualization of Myocardial Ischemia with x ^-Substrates in Vitro and in Vivo

... Alterations of myocardial metabolism associated with hypoxia or reduced coronary perfusion often have been evaluated in isolated perfused hearts under conditions in which the availabilit[r] ...

9

Immersive Visualization for Abnormal Detection in Heterogeneous Data for On-site Decision Making

Immersive Visualization for Abnormal Detection in Heterogeneous Data for On-site Decision Making

... anomaly detection techniques are domain ...anomaly detection is usually in form of suspicious levels or scores ...anomalies detection and visualization ...

10

Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse

Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse

... where a non-parametric method called Washer was in- troduced. The need to simultaneously consider multiple anomaly detectors was discussed in [9]. In spite of many successes, rapidly discovering novel and sophisticated ...

10

Visualization and clustering for SNMP intrusion detection

Visualization and clustering for SNMP intrusion detection

... MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS) was proposed (Herrero and Corchado 2009; Corchado and Her- rero 2011) as a novel IDS comprising a Hybrid Artificial Intelligent System (HAIS). It monitored ...

20

A Visualization Paradigm for Network Intrusion Detection

A Visualization Paradigm for Network Intrusion Detection

... V. Results A prototype of our system, termed VisAlert, was de- ployed and tested at the Air Force Research Lab (AFRL) in Rome, New York, for one week in December 2004. Dur- ing this time we collected information from ...
Interactive Visualization for Network and Port Scan Detection

Interactive Visualization for Network and Port Scan Detection

... the detection of interesting information in the logs, using both traditional information visualization mechanisms like parallel coordinates, self-organizing maps, and multi-dimensional scaling, and novel ...

20

Detection of damage of a filter by visualization of filtration process

Detection of damage of a filter by visualization of filtration process

... Abstract. This paper deals with testing of filters on the basis of visualization of filtration process. A filtration material can be damaged by flow of the filtered medium, high pressure drop and long-term adverse ...

8

Network Intrusion Detection: Monitoring, Simulation and Visualization

Network Intrusion Detection: Monitoring, Simulation and Visualization

... passive detection approach for a DOS attack, ”SOS” will not do anything when detecting the malicious DOS traffic and will not attempt to disable the source of the ...DOS detection strategy that is grounded ...

160

Intrusion Detection System Visualization of Network Alerts

Intrusion Detection System Visualization of Network Alerts

... Figure 1: Network Security Data Sources 6 Figure 2: Snort Alert Monitor 7 Figure 3: Open Source Security Information Management 8 Figure 4: Etherape 9 Figure 5: Generated output used[r] ...

20

Network Traffic Visualization Framework for Threat Prediction and Detection

Network Traffic Visualization Framework for Threat Prediction and Detection

... In conclusion, we present a matrix based visualization scheme. This method consists of four matrices of source and destination IPs and ports. The timelines of four kinds of entropies are also visualizing, ie both ...

6

Anomaly Detection in Predictive Maintenance Time Alignment and Visualization

Anomaly Detection in Predictive Maintenance Time Alignment and Visualization

... Anomaly Detection: Ideal Prediction Foresees Failures Before They Occur We are all witnessing the current explosion of data: social media data, clinical data, system data, CRM data, web data, and lately tons of ...

13

Show all 10000 documents...

Related subjects