• No results found

many anomaly detection technique

Incorporating Hidden Markov Model into Anomaly Detection Technique for Network Intrusion Detection

Incorporating Hidden Markov Model into Anomaly Detection Technique for Network Intrusion Detection

... This paper investigated the capabilities of Hidden Markov Model in Anomaly Detection technique of Intrusion detection System. As described above, one HMM has been trained for each TCP session ...

6

An Application of Big Data in Social Media Anomaly Detection using Weight Based Technique to Compare Performance of PIG and HIVE

An Application of Big Data in Social Media Anomaly Detection using Weight Based Technique to Compare Performance of PIG and HIVE

... develop anomaly detection technique for discovering fake profile over social media platform more specifically for the twitter social media using BIG data ...i.e. anomaly and legitimate. After ...

6

Energy forecasting based on predictive data mining techniques in smart energy grids

Energy forecasting based on predictive data mining techniques in smart energy grids

... appropriate anomaly detection technique and data-driven methodology for energy production forecasting along with developing a unified model for long-term forecasting with step of short-term (hourly) ...

7

A Secure Cold Start Online Product Recommendation System with Reputation Defense Technique Using Anomaly Detection

A Secure Cold Start Online Product Recommendation System with Reputation Defense Technique Using Anomaly Detection

... Abstract:Connecting Social Media to E-Commerce System with Reputation System and making the proposed system more secure with Anomaly based technique. In the existing paper, the author proposed learning both ...

6

Design and Implementation of Anomaly Detections for User Authentication Framework

Design and Implementation of Anomaly Detections for User Authentication Framework

... Anomaly detection is quickly becoming a very significant tool for a variety of applications such as intrusion detection, fraud detection, fault detection, system health monitoring, and ...

254

APPLICATION OF FITNESS SWITCHING GENETIC ALGORITHM FOR SOLVING 0 1 KNAPSACK 
PROBLEM

APPLICATION OF FITNESS SWITCHING GENETIC ALGORITHM FOR SOLVING 0 1 KNAPSACK PROBLEM

... In the experiment, data collection practices are critical but challenging in many aspects. Data should be accumulated consistently, because inconsistent data collection intervals will generate unintended or ...

10

Effective Credit Default Scoring using Anomaly Detection

Effective Credit Default Scoring using Anomaly Detection

... person. Anomaly Detection is the process of classifies unusual ...data. Anomaly detection is an important tool to detect irregularity in many different domains including financial fraud ...

10

Research on the Anomaly Detection Method in Intelligent Patrol Based on Big Data Analysis

Research on the Anomaly Detection Method in Intelligent Patrol Based on Big Data Analysis

... point detection method to output ideal analysis ...network anomaly detection system which combines with the big data ...network anomaly detection method based on multi-scale principal ...

7

Anomaly behaviour detection based on the meta-Morisita index for large scale spatio-temporal data set

Anomaly behaviour detection based on the meta-Morisita index for large scale spatio-temporal data set

... Anomaly detection for analysing spatio-temporal data remains a rapidly growing prob- lem in the wake of an ever-increasing number of advanced sensors that are continu- ously generating large-scale ...

28

An Anomaly based Intrusion Detection System in Presence of Benign Outliers with Visualization Capabilities

An Anomaly based Intrusion Detection System in Presence of Benign Outliers with Visualization Capabilities

... Intrusion Detection Systems (IDSs) and visualization techniques has considerably become an important research topic to protect computer networks from ...novel anomaly-based intrusion detection system ...

42

SensorWebIDS: A sensor with misuse and anomaly based data mining technique for web intrusion detection.

SensorWebIDS: A sensor with misuse and anomaly based data mining technique for web intrusion detection.

... intrusion detection system, SensorWeblDS, which combines the power of anomaly detection and misuse ...intrusion detection systems audit each record separately, while our system consider the ...

96

Multilayer Statistical Intrusion Detection in Wireless Networks

Multilayer Statistical Intrusion Detection in Wireless Networks

... intrusion detection approach for wireless ...traffic anomaly detectors. The antispoofing technique consists of a radio signal fingerprinting mechanism and a geometrical clustering algorithm while traffic ...

13

Enhanced Intrusion Network System using Fuzzy –K Mediod Clustering Method

Enhanced Intrusion Network System using Fuzzy –K Mediod Clustering Method

... and detection methods of the network ...pattern detection, classifier and ...in detection of the ...with detection value up to ...the detection of ...different detection ...

5

Mention Anomaly Based Event Detection using Real Time Twitter Data

Mention Anomaly Based Event Detection using Real Time Twitter Data

... Micro blogging is a broadcast medium that allows users to exchange small digital content such as short texts, links, images, or videos. Virtually any person witnessing or involved in any event is nowadays able to ...

6

Evaluation of Unsupervised Anomaly Detection Methods in Sentiment Mining

Evaluation of Unsupervised Anomaly Detection Methods in Sentiment Mining

... the anomaly detection methods it is noticed that density based LOF strategy demonstrates to be the best for sentiment mining movie review dataset based on Table ...LOF, anomaly score is determined, ...

6

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average

... differences between the actual network traffic and the estimated ARFIMA model of that traffic for the analyzed WSN network parameters were used. For the purpose of suitable preparation of data for statistical modeling, ...

14

Anomaly Detection in Videos.

Anomaly Detection in Videos.

... Xu15; Hin17; Rav18]), there are other papers that use a different formulation ([Sul18; Ion17; Ada08; Liu18a; Has16; Umn]). For example, some papers do not assume that the normal videos all come from a single, static ...

102

Vol 8, No 7 (2018)

Vol 8, No 7 (2018)

... the anomaly detection in data mining using machine learning ...limitation, detection capacity, shape anomaly so using proposed flow try to solve issue like time, dataset, detection ...

14

Autonomous anomaly detection

Autonomous anomaly detection

... Abstract—In this paper, a new approach for autonomous anomaly detection is introduced within the Empirical Data Analytics (EDA) framework. This approach is fully data-driven and free from thresholds. ...

8

Unsupervised Machine Learning for Networking:Techniques, Applications and Research Challenges

Unsupervised Machine Learning for Networking:Techniques, Applications and Research Challenges

... ABSTRACT While machine learning and artificial intelligence have long been applied in networking research, the bulk of such works has focused on supervised learning. Recently, there has been a rising trend of employing ...

36

Show all 10000 documents...

Related subjects