Letteratura scientifica selezionata sul tema "Networks anomalies detection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Networks anomalies detection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Networks anomalies detection"
Mažeika, Dalius, e Saulius Jasonis. "NETWORK TRAFFIC ANOMALIES DETECTING USING MAXIMUM ENTROPY METHOD / KOMPIUTERIŲ TINKLO SRAUTO ANOMALIJŲ ATPAŽINIMAS MAKSIMALIOS ENTROPIJOS METODU". Mokslas – Lietuvos ateitis 6, n. 2 (24 aprile 2014): 162–67. http://dx.doi.org/10.3846/mla.2014.22.
Testo completoRačys, Donatas, e Dalius Mažeika. "NETWORK TRAFFIC ANOMALIES IDENTIFICATION BASED ON CLASSIFICATION METHODS / TINKLO SRAUTO ANOMALIJŲ IDENTIFIKAVIMAS, TAIKANT KLASIFIKAVIMO METODUS". Mokslas – Lietuvos ateitis 7, n. 3 (13 luglio 2015): 340–44. http://dx.doi.org/10.3846/mla.2015.796.
Testo completoRejito, Juli, Deris Stiawan, Ahmed Alshaflut e Rahmat Budiarto. "Machine learning-based anomaly detection for smart home networks under adversarial attack". Computer Science and Information Technologies 5, n. 2 (1 luglio 2024): 122–29. http://dx.doi.org/10.11591/csit.v5i2.p122-129.
Testo completoRejito, Juli, Deris Stiawan, Ahmed Alshaflut e Rahmat Budiarto. "Machine learning-based anomaly detection for smart home networks under adversarial attack". Computer Science and Information Technologies 5, n. 2 (1 luglio 2024): 122–29. http://dx.doi.org/10.11591/csit.v5i2.pp122-129.
Testo completoLiao, Xiao Ju, Yi Wang e Hai Lu. "Rule Anomalies Detection in Firewalls". Key Engineering Materials 474-476 (aprile 2011): 822–27. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.822.
Testo completoGutiérrez-Gómez, Leonardo, Alexandre Bovet e Jean-Charles Delvenne. "Multi-Scale Anomaly Detection on Attributed Networks". Proceedings of the AAAI Conference on Artificial Intelligence 34, n. 01 (3 aprile 2020): 678–85. http://dx.doi.org/10.1609/aaai.v34i01.5409.
Testo completoRana, Samir. "Anomaly Detection in Network Traffic using Machine Learning and Deep Learning Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n. 2 (10 settembre 2019): 1063–67. http://dx.doi.org/10.17762/turcomat.v10i2.13626.
Testo completoJiang, Ding De, Cheng Yao, Zheng Zheng Xu, Peng Zhang, Zhen Yuan e Wen Da Qin. "An Continuous Wavelet Transform-Based Detection Approach to Traffic Anomalies". Applied Mechanics and Materials 130-134 (ottobre 2011): 2098–102. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2098.
Testo completoA, Nandini. "Anomaly Detection Using CNN with I3D Feature Extraction". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 03 (18 marzo 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29371.
Testo completoBadr, Malek, Shaha Al-Otaibi, Nazik Alturki e Tanvir Abir. "Deep Learning-Based Networks for Detecting Anomalies in Chest X-Rays". BioMed Research International 2022 (23 luglio 2022): 1–10. http://dx.doi.org/10.1155/2022/7833516.
Testo completoTesi sul tema "Networks anomalies detection"
Sithirasenan, Elankayer. "Substantiating Anomalies in Wireless Networks Using Outlier Detection Techniques". Thesis, Griffith University, 2009. http://hdl.handle.net/10072/365690.
Testo completoThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Abuaitah, Giovani Rimon. "ANOMALIES IN SENSOR NETWORK DEPLOYMENTS: ANALYSIS, MODELING, AND DETECTION". Wright State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=wright1376594068.
Testo completoVerner, Alexander. "LSTM Networks for Detection and Classification of Anomalies in Raw Sensor Data". Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1074.
Testo completoKamat, Sai Shyamsunder. "Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259187.
Testo completoI det 21: a århundradet är information den nya valutan. Med allnärvaro av enheter anslutna till internet har mänskligheten tillgång till information inom ett ögonblick. Det finns dock vissa grupper som använder metoder för att stjäla information för personlig vinst via internet. Ett intrångsdetekteringssystem (IDS) övervakar ett nätverk för misstänkta aktiviteter och varnar dess ägare om ett oönskat intrång skett. Kommersiella IDS reagerar efter detekteringen av ett intrångsförsök. Angreppen blir alltmer komplexa och det kan vara dyrt att vänta på att attackerna ska ske för att reagera senare. Det är avgörande för nätverksägare att använda IDS:er som på ett förebyggande sätt kan skilja på oskadlig dataanvändning från skadlig. Maskininlärning kan lösa detta problem. Den kan analysera all befintliga data om internettrafik, känna igen mönster och förutse användarnas beteende. Detta projekt syftar till att studera hur effektivt Radial Basis Function Neural Networks (RBFN) med Djupinlärnings arkitektur kan påverka intrångsdetektering. Från detta perspektiv ställs frågan hur väl en RBFN kan förutsäga skadliga intrångsförsök, särskilt i jämförelse med befintliga detektionsmetoder.Här är RBFN definierad som en flera-lagers neuralt nätverksmodell som använder en radiell grundfunktion för att omvandla data till linjärt separerbar. Efter en undersökning av modern litteratur och lokalisering av ett namngivet dataset användes kvantitativ forskningsmetodik med prestanda indikatorer för att utvärdera RBFN: s prestanda. En Random Forest Classifier algorithm användes också för jämförelse. Resultaten erhölls efter en serie finjusteringar av parametrar på modellerna. Resultaten visar att RBFN är korrekt när den förutsäger avvikande internetbeteende i genomsnitt 80% av tiden. Andra algoritmer i litteraturen beskrivs som mer än 90% korrekta. Den föreslagna RBFN-modellen är emellertid mycket exakt när man registrerar specifika typer av attacker som Port Scans och BotNet malware. Resultatet av projektet visar att den föreslagna metoden är allvarligt påverkad av begränsningar. T.ex. så behöver modellen finjusteras över flera försök för att uppnå önskad noggrannhet. En möjlig lösning är att begränsa denna modell till att endast förutsäga malware-attacker och använda andra maskininlärnings-algoritmer för andra attacker.
Kabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.
Testo completoSCADA systems are more and more targeted by cyber-attacks because of many vulnerabilities inhardware, software, protocols and the communication stack. Those systems nowadays use standard hardware, software, operating systems and protocols. Furthermore, SCADA systems which used to be air-gaped are now interconnected to corporate networks and to the Internet, widening the attack surface.In this thesis, we are using a deep learning approach to propose an efficient hybrid deep neural network for anomaly detection in SCADA systems. The salient features of SCADA data are automatically and unsupervisingly learnt, and then fed to a supervised classifier in order to dertermine if those data are normal or abnormal, i.e if there is a cyber-attack or not. Afterwards, as a response to the challenge caused by high training time of deep learning models, we proposed a distributed approach of our anomaly detection system in order lo lessen the training time of our model
Jin, Fang. "Algorithms for Modeling Mass Movements and their Adoption in Social Networks". Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72292.
Testo completoPh. D.
Mdini, Maha. "Anomaly detection and root cause diagnosis in cellular networks". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0144/document.
Testo completoWith the evolution of automation and artificial intelligence tools, mobile networks havebecome more and more machine reliant. Today, a large part of their management tasks runs inan autonomous way, without human intervention. In this thesis, we have focused on takingadvantage of the data analysis tools to automate the troubleshooting task and carry it to a deeperlevel. To do so, we have defined two main objectives: anomaly detection and root causediagnosis. The first objective is about detecting issues in the network automatically withoutincluding expert knowledge. To meet this objective, we have proposed an algorithm, WatchmenAnomaly Detection (WAD), based on pattern recognition. It learns patterns from periodic timeseries and detect distortions in the flow of new data. The second objective aims at identifying theroot cause of issues without any prior knowledge about the network topology and services. Toaddress this question, we have designed an algorithm, Automatic Root Cause Diagnosis (ARCD)that identifies the roots of network issues. ARCD is composed of two independent threads: MajorContributor identification and Incompatibility detection. WAD and ARCD have been proven to beeffective. However, many improvements of these algorithms are possible
Moussa, Mohamed Ali. "Data gathering and anomaly detection in wireless sensors networks". Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC1082/document.
Testo completoThe use of Wireless Sensor Networks (WSN)s is steadily increasing to cover various applications and domains. This trend is supported by the technical advancements in sensor manufacturing process which allow a considerable reduction in the cost and size of these components. However, there are several challenges facing the deployment and the good functioning of this type of networks. Indeed, WSN's applications have to deal with the limited energy, memory and processing capacities of sensor nodes as well as the imperfection of the probed data. This dissertation addresses the problem of collecting data and detecting anomalies in WSNs. The aforementioned functionality needs to be achieved while ensuring a reliable data quality at the collector node, a good anomaly detection accuracy, a low false alarm rate as well as an efficient energy consumption solution. Throughout this work, we provide different solutions that allow to meet these requirements. Foremost, we propose a Compressive Sensing (CS) based solution that allows to equilibrate the traffic carried by nodes regardless their distance from the sink. This solution promotes a larger lifespan of the WSN since it balances the energy consumption between sensor nodes. Our approach differs from existing CS-based solutions by taking into account the sparsity of sensory representation in the temporal domain in addition to the spatial dimension. Moreover, we propose a new formulation to detect aberrant readings. The simulations carried on real datasets prove the efficiency of our approach in terms of data recovering and anomaly detection compared to existing solutions. Aiming to further optimize the use of WSN resources, we propose in our second contribution a Matrix Completion (MC) based data gathering and anomaly detection solution where an arbitrary subset of nodes contributes at the data gathering process at each operating period. To fill the missing values, we mainly relay on the low rank structure of sensory data as well as the sparsity of readings in some transform domain. The developed algorithm also allows to dissemble anomalies from the normal data structure. This solution is enhanced in our third contribution where we propose a constrained formulation of the data gathering and anomalies detection problem. We reformulate the textit{a prior} knowledge about the target data as hard convex constraints. Thus, the involved parameters into the developed algorithm become easy to adjust since they are related to some physical properties of the treated data. Both MC based approaches are tested on real datasets and demonstrate good capabilities in terms of data reconstruction quality and anomaly detection performance. Finally, we propose in the last contribution a position based compressive data gathering scheme where nodes cooperate to compute and transmit only the relevant positions of their sensory sparse representation. This technique provide an efficient tool to deal with the noisy nature of WSN environment as well as detecting spikes in the sensory data. Furthermore, we validate the efficiency of our solution by a theoretical analysis and corroborate it by a simulation evaluation
Audibert, Julien. "Unsupervised anomaly detection in time-series". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS358.
Testo completoAnomaly detection in multivariate time series is a major issue in many fields. The increasing complexity of systems and the explosion of the amount of data have made its automation indispensable. This thesis proposes an unsupervised method for anomaly detection in multivariate time series called USAD. However, deep neural network methods suffer from a limitation in their ability to extract features from the data since they only rely on local information. To improve the performance of these methods, this thesis presents a feature engineering strategy that introduces non-local information. Finally, this thesis proposes a comparison of sixteen time series anomaly detection methods to understand whether the explosion in complexity of neural network methods proposed in the current literature is really necessary
Orman, Keziban. "Contribution to the interpretation of evolving communities in complex networks : Application to the study of social interactions". Thesis, Lyon, INSA, 2014. http://www.theses.fr/2014ISAL0072/document.
Testo completoComplex Networks constitute a convenient tool to model real-world complex systems. For this reason, they have become very popular in the last decade. Many tools exist to study complex networks. Among them, community detection is one of the most important. A community is roughly defined as a group of nodes more connected internally than to the rest of the network. In the literature, this intuitive definition has been formalized in many ways, leading to countless different methods and variants to detect communities. In the large majority of cases, the result of these methods is set of node groups in which each node group corresponds to a community. From the applicative point of view, the meaning of these groups is as important as their detection. However, although the task of detecting communities in itself took a lot of attraction, the problem of interpreting them has not been properly tackled until now. In this thesis, we see the interpretation of communities as a problem independent from the community detection process, consisting in identifying the most characteristic features of communities. We break it down into two sub-problems: 1) finding an appropriate way to represent a community and 2) objectively selecting the most characteristic parts of this representation. To solve them, we take advantage of the information encoded in dynamic attributed networks. We propose a new representation of communities under the form of temporal sequences of topological measures and attribute values associated to individual nodes. We then look for emergent sequential patterns in this dataset, in order to identify the most characteristic community features. We perform a validation of our framework on artificially generated dynamic attributed networks. At this occasion, we study its behavior relatively to changes in the temporal evolution of the communities, and to the distribution and evolution of nodal features. We also apply our framework to real-world systems: a DBLP network of scientific collaborations, and a LastFM network of social and musical interactions. Our results show that the detected communities are not completely homogeneous, in the sense several node topic or interests can be identified for a given community. Some communities are composed of smaller groups of nodes which tend to evolve together as time goes by, be it in terms of individual (attributes, topological measures) or relational (community migration) features. The detected anomalies generally fit some generic profiles: nodes misplaced by the community detection tool, nodes relatively similar to their communities, but also significantly different on certain features and/or not synchronized with their community evolution, and finally nodes with completely different interests
Libri sul tema "Networks anomalies detection"
T, Feagin, Overland D, University of Houston--Clear Lake. Research Institute for Computing and Information Systems. e Lyndon B. Johnson Space Center., a cura di. Communications and tracking expert systems study. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston--Clear Lake, 1987.
Cerca il testo completoParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Cerca il testo completoHands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. de Gruyter GmbH, Walter, 2019.
Cerca il testo completoCapitoli di libri sul tema "Networks anomalies detection"
Krzysztoń, Mateusz, Marcin Lew e Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic". In Cybersecurity of Digital Service Chains, 83–102. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Testo completoAkashi, Osamu, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Mitsuru Maruyama e Toshiharu Sugawara. "Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents". In Ambient Networks, 181–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11568285_16.
Testo completoČermák, Milan, Pavel Čeleda e Jan Vykopal. "Detection of DNS Traffic Anomalies in Large Networks". In Lecture Notes in Computer Science, 215–26. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13488-8_20.
Testo completoDawoud, Ahmed, Seyed Shahristani e Chun Raun. "Unsupervised Deep Learning for Software Defined Networks Anomalies Detection". In Lecture Notes in Computer Science, 167–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-59540-4_9.
Testo completoHossain, Md Azam, Iqram Hussain, Baseem Al-Athwari e Santosh Dahit. "Network Traffic Anomalies Detection Using Machine Learning Algorithm: A Performance Study". In Lecture Notes in Networks and Systems, 274–82. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9480-6_26.
Testo completoBhattacharya, Saurabh, e Manju Pandey. "Anomalies Detection on Contemporary Industrial Internet of Things Data for Securing Crucial Devices". In Lecture Notes in Networks and Systems, 11–20. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9228-5_2.
Testo completoLaRock, Timothy, Vahan Nanumyan, Ingo Scholtes, Giona Casiraghi, Tina Eliassi-Rad e Frank Schweitzer. "HYPA: Efficient Detection of Path Anomalies in Time Series Data on Networks". In Proceedings of the 2020 SIAM International Conference on Data Mining, 460–68. Philadelphia, PA: Society for Industrial and Applied Mathematics, 2020. http://dx.doi.org/10.1137/1.9781611976236.52.
Testo completoRomero, Santiago Felipe Luna, e Luis Serpa-Andrade. "Intelligent Agent Proposal in a Building Electricity Monitoring System for Anomalies’ Detection Using Reinforcement Learning". In Lecture Notes in Networks and Systems, 207–15. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80624-8_26.
Testo completoRajendra, S., Chittaranjan Pradhan e Jayavel Kanniappan. "An Adaptive Detection Mechanism for IoT Devices Anomalies Using AI/ML Based on User Pattern". In Lecture Notes in Networks and Systems, 13–25. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9043-6_2.
Testo completoWankhade, Kapil Keshao, Snehlata Dongre, Ravi Chandra, Kishore V. Krishnan e Srikanth Arasavilli. "Machine Learning-Based Detection of Attacks and Anomalies in Industrial Internet of Things (IIoT) Networks". In Applied Soft Computing and Communication Networks, 91–109. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-2004-0_7.
Testo completoAtti di convegni sul tema "Networks anomalies detection"
Huang, Hao, Tapan Shah, John Karigiannis e Scott Evans. "Deep Root Cause Analysis: Unveiling Anomalies and Enhancing Fault Detection in Industrial Time Series". In 2024 International Joint Conference on Neural Networks (IJCNN), 1–8. IEEE, 2024. http://dx.doi.org/10.1109/ijcnn60899.2024.10650906.
Testo completoMosayebi, Reza, e Lutz Lampe. "Anomaly Detection in Optical Fiber: A Change-Point Detection Perspective". In Signal Processing in Photonic Communications, SpTh2G.4. Washington, D.C.: Optica Publishing Group, 2024. http://dx.doi.org/10.1364/sppcom.2024.spth2g.4.
Testo completoKolodziej, Joanna, Mateusz Krzyszton e Pawel Szynkiewicz. "Anomaly Detection In TCP/IP Networks". In 37th ECMS International Conference on Modelling and Simulation. ECMS, 2023. http://dx.doi.org/10.7148/2023-0542.
Testo completoLi, Jundong, Harsh Dani, Xia Hu e Huan Liu. "Radar: Residual Analysis for Anomaly Detection in Attributed Networks". In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/299.
Testo completoZhang, Jiaqiang, Senzhang Wang e Songcan Chen. "Reconstruction Enhanced Multi-View Contrastive Learning for Anomaly Detection on Attributed Networks". In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/330.
Testo completoLiu, Chen, Shibo He, Qihang Zhou, Shizhong Li e Wenchao Meng. "Large Language Model Guided Knowledge Distillation for Time Series Anomaly Detection". In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. California: International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/239.
Testo completoZhang, Zheng, e Liang Zhao. "Unsupervised Deep Subgraph Anomaly Detection (Extended Abstract)". In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/730.
Testo completoShekhar, Prashant, e Rahul Rai. "Anomaly Detection in Complex Spatiotemporal Networks Through Location Aware Geospatial Big Data Sets". In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59587.
Testo completoBarker, Jack W., e Toby P. Breckon. "PANDA: Perceptually Aware Neural Detection of Anomalies". In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 2021. http://dx.doi.org/10.1109/ijcnn52387.2021.9534399.
Testo completoLiu, Ninghao, Xiao Huang e Xia Hu. "Accelerated Local Anomaly Detection via Resolving Attributed Networks". In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/325.
Testo completoRapporti di organizzazioni sul tema "Networks anomalies detection"
Kirichek, Galina, Vladyslav Harkusha, Artur Timenko e Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], febbraio 2020. http://dx.doi.org/10.31812/123456789/3743.
Testo completoTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, gennaio 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Testo completoLeón, Carlos. Detecting anomalous payments networks: A dimensionality reduction approach. Banco de la República de Colombia, dicembre 2019. http://dx.doi.org/10.32468/be.1098.
Testo completoValdez, Luis, e Alexander Heifetz. Detection of Anomalies in Environmental Gamma Radiation Background with Hopfield Artificial Neural Network - Consortium on Nuclear Security Technologies (CONNECT) Q3 Report. Office of Scientific and Technical Information (OSTI), gennaio 2021. http://dx.doi.org/10.2172/1827413.
Testo completo