Literatura científica selecionada sobre o tema "Networks anomalies detection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Networks anomalies detection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Networks anomalies detection"
Mažeika, Dalius, e Saulius Jasonis. "NETWORK TRAFFIC ANOMALIES DETECTING USING MAXIMUM ENTROPY METHOD / KOMPIUTERIŲ TINKLO SRAUTO ANOMALIJŲ ATPAŽINIMAS MAKSIMALIOS ENTROPIJOS METODU". Mokslas – Lietuvos ateitis 6, n.º 2 (24 de abril de 2014): 162–67. http://dx.doi.org/10.3846/mla.2014.22.
Texto completo da fonteRačys, Donatas, e Dalius Mažeika. "NETWORK TRAFFIC ANOMALIES IDENTIFICATION BASED ON CLASSIFICATION METHODS / TINKLO SRAUTO ANOMALIJŲ IDENTIFIKAVIMAS, TAIKANT KLASIFIKAVIMO METODUS". Mokslas – Lietuvos ateitis 7, n.º 3 (13 de julho de 2015): 340–44. http://dx.doi.org/10.3846/mla.2015.796.
Texto completo da fonteRejito, Juli, Deris Stiawan, Ahmed Alshaflut e Rahmat Budiarto. "Machine learning-based anomaly detection for smart home networks under adversarial attack". Computer Science and Information Technologies 5, n.º 2 (1 de julho de 2024): 122–29. http://dx.doi.org/10.11591/csit.v5i2.p122-129.
Texto completo da fonteRejito, Juli, Deris Stiawan, Ahmed Alshaflut e Rahmat Budiarto. "Machine learning-based anomaly detection for smart home networks under adversarial attack". Computer Science and Information Technologies 5, n.º 2 (1 de julho de 2024): 122–29. http://dx.doi.org/10.11591/csit.v5i2.pp122-129.
Texto completo da fonteLiao, Xiao Ju, Yi Wang e Hai Lu. "Rule Anomalies Detection in Firewalls". Key Engineering Materials 474-476 (abril de 2011): 822–27. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.822.
Texto completo da fonteGutiérrez-Gómez, Leonardo, Alexandre Bovet e Jean-Charles Delvenne. "Multi-Scale Anomaly Detection on Attributed Networks". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 01 (3 de abril de 2020): 678–85. http://dx.doi.org/10.1609/aaai.v34i01.5409.
Texto completo da fonteRana, Samir. "Anomaly Detection in Network Traffic using Machine Learning and Deep Learning Techniques". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n.º 2 (10 de setembro de 2019): 1063–67. http://dx.doi.org/10.17762/turcomat.v10i2.13626.
Texto completo da fonteJiang, Ding De, Cheng Yao, Zheng Zheng Xu, Peng Zhang, Zhen Yuan e Wen Da Qin. "An Continuous Wavelet Transform-Based Detection Approach to Traffic Anomalies". Applied Mechanics and Materials 130-134 (outubro de 2011): 2098–102. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.2098.
Texto completo da fonteA, Nandini. "Anomaly Detection Using CNN with I3D Feature Extraction". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 03 (18 de março de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29371.
Texto completo da fonteBadr, Malek, Shaha Al-Otaibi, Nazik Alturki e Tanvir Abir. "Deep Learning-Based Networks for Detecting Anomalies in Chest X-Rays". BioMed Research International 2022 (23 de julho de 2022): 1–10. http://dx.doi.org/10.1155/2022/7833516.
Texto completo da fonteTeses / dissertações sobre o assunto "Networks anomalies detection"
Sithirasenan, Elankayer. "Substantiating Anomalies in Wireless Networks Using Outlier Detection Techniques". Thesis, Griffith University, 2009. http://hdl.handle.net/10072/365690.
Texto completo da fonteThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Abuaitah, Giovani Rimon. "ANOMALIES IN SENSOR NETWORK DEPLOYMENTS: ANALYSIS, MODELING, AND DETECTION". Wright State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=wright1376594068.
Texto completo da fonteVerner, Alexander. "LSTM Networks for Detection and Classification of Anomalies in Raw Sensor Data". Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1074.
Texto completo da fonteKamat, Sai Shyamsunder. "Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259187.
Texto completo da fonteI det 21: a århundradet är information den nya valutan. Med allnärvaro av enheter anslutna till internet har mänskligheten tillgång till information inom ett ögonblick. Det finns dock vissa grupper som använder metoder för att stjäla information för personlig vinst via internet. Ett intrångsdetekteringssystem (IDS) övervakar ett nätverk för misstänkta aktiviteter och varnar dess ägare om ett oönskat intrång skett. Kommersiella IDS reagerar efter detekteringen av ett intrångsförsök. Angreppen blir alltmer komplexa och det kan vara dyrt att vänta på att attackerna ska ske för att reagera senare. Det är avgörande för nätverksägare att använda IDS:er som på ett förebyggande sätt kan skilja på oskadlig dataanvändning från skadlig. Maskininlärning kan lösa detta problem. Den kan analysera all befintliga data om internettrafik, känna igen mönster och förutse användarnas beteende. Detta projekt syftar till att studera hur effektivt Radial Basis Function Neural Networks (RBFN) med Djupinlärnings arkitektur kan påverka intrångsdetektering. Från detta perspektiv ställs frågan hur väl en RBFN kan förutsäga skadliga intrångsförsök, särskilt i jämförelse med befintliga detektionsmetoder.Här är RBFN definierad som en flera-lagers neuralt nätverksmodell som använder en radiell grundfunktion för att omvandla data till linjärt separerbar. Efter en undersökning av modern litteratur och lokalisering av ett namngivet dataset användes kvantitativ forskningsmetodik med prestanda indikatorer för att utvärdera RBFN: s prestanda. En Random Forest Classifier algorithm användes också för jämförelse. Resultaten erhölls efter en serie finjusteringar av parametrar på modellerna. Resultaten visar att RBFN är korrekt när den förutsäger avvikande internetbeteende i genomsnitt 80% av tiden. Andra algoritmer i litteraturen beskrivs som mer än 90% korrekta. Den föreslagna RBFN-modellen är emellertid mycket exakt när man registrerar specifika typer av attacker som Port Scans och BotNet malware. Resultatet av projektet visar att den föreslagna metoden är allvarligt påverkad av begränsningar. T.ex. så behöver modellen finjusteras över flera försök för att uppnå önskad noggrannhet. En möjlig lösning är att begränsa denna modell till att endast förutsäga malware-attacker och använda andra maskininlärnings-algoritmer för andra attacker.
Kabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.
Texto completo da fonteSCADA systems are more and more targeted by cyber-attacks because of many vulnerabilities inhardware, software, protocols and the communication stack. Those systems nowadays use standard hardware, software, operating systems and protocols. Furthermore, SCADA systems which used to be air-gaped are now interconnected to corporate networks and to the Internet, widening the attack surface.In this thesis, we are using a deep learning approach to propose an efficient hybrid deep neural network for anomaly detection in SCADA systems. The salient features of SCADA data are automatically and unsupervisingly learnt, and then fed to a supervised classifier in order to dertermine if those data are normal or abnormal, i.e if there is a cyber-attack or not. Afterwards, as a response to the challenge caused by high training time of deep learning models, we proposed a distributed approach of our anomaly detection system in order lo lessen the training time of our model
Jin, Fang. "Algorithms for Modeling Mass Movements and their Adoption in Social Networks". Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72292.
Texto completo da fontePh. D.
Mdini, Maha. "Anomaly detection and root cause diagnosis in cellular networks". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0144/document.
Texto completo da fonteWith the evolution of automation and artificial intelligence tools, mobile networks havebecome more and more machine reliant. Today, a large part of their management tasks runs inan autonomous way, without human intervention. In this thesis, we have focused on takingadvantage of the data analysis tools to automate the troubleshooting task and carry it to a deeperlevel. To do so, we have defined two main objectives: anomaly detection and root causediagnosis. The first objective is about detecting issues in the network automatically withoutincluding expert knowledge. To meet this objective, we have proposed an algorithm, WatchmenAnomaly Detection (WAD), based on pattern recognition. It learns patterns from periodic timeseries and detect distortions in the flow of new data. The second objective aims at identifying theroot cause of issues without any prior knowledge about the network topology and services. Toaddress this question, we have designed an algorithm, Automatic Root Cause Diagnosis (ARCD)that identifies the roots of network issues. ARCD is composed of two independent threads: MajorContributor identification and Incompatibility detection. WAD and ARCD have been proven to beeffective. However, many improvements of these algorithms are possible
Moussa, Mohamed Ali. "Data gathering and anomaly detection in wireless sensors networks". Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC1082/document.
Texto completo da fonteThe use of Wireless Sensor Networks (WSN)s is steadily increasing to cover various applications and domains. This trend is supported by the technical advancements in sensor manufacturing process which allow a considerable reduction in the cost and size of these components. However, there are several challenges facing the deployment and the good functioning of this type of networks. Indeed, WSN's applications have to deal with the limited energy, memory and processing capacities of sensor nodes as well as the imperfection of the probed data. This dissertation addresses the problem of collecting data and detecting anomalies in WSNs. The aforementioned functionality needs to be achieved while ensuring a reliable data quality at the collector node, a good anomaly detection accuracy, a low false alarm rate as well as an efficient energy consumption solution. Throughout this work, we provide different solutions that allow to meet these requirements. Foremost, we propose a Compressive Sensing (CS) based solution that allows to equilibrate the traffic carried by nodes regardless their distance from the sink. This solution promotes a larger lifespan of the WSN since it balances the energy consumption between sensor nodes. Our approach differs from existing CS-based solutions by taking into account the sparsity of sensory representation in the temporal domain in addition to the spatial dimension. Moreover, we propose a new formulation to detect aberrant readings. The simulations carried on real datasets prove the efficiency of our approach in terms of data recovering and anomaly detection compared to existing solutions. Aiming to further optimize the use of WSN resources, we propose in our second contribution a Matrix Completion (MC) based data gathering and anomaly detection solution where an arbitrary subset of nodes contributes at the data gathering process at each operating period. To fill the missing values, we mainly relay on the low rank structure of sensory data as well as the sparsity of readings in some transform domain. The developed algorithm also allows to dissemble anomalies from the normal data structure. This solution is enhanced in our third contribution where we propose a constrained formulation of the data gathering and anomalies detection problem. We reformulate the textit{a prior} knowledge about the target data as hard convex constraints. Thus, the involved parameters into the developed algorithm become easy to adjust since they are related to some physical properties of the treated data. Both MC based approaches are tested on real datasets and demonstrate good capabilities in terms of data reconstruction quality and anomaly detection performance. Finally, we propose in the last contribution a position based compressive data gathering scheme where nodes cooperate to compute and transmit only the relevant positions of their sensory sparse representation. This technique provide an efficient tool to deal with the noisy nature of WSN environment as well as detecting spikes in the sensory data. Furthermore, we validate the efficiency of our solution by a theoretical analysis and corroborate it by a simulation evaluation
Audibert, Julien. "Unsupervised anomaly detection in time-series". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS358.
Texto completo da fonteAnomaly detection in multivariate time series is a major issue in many fields. The increasing complexity of systems and the explosion of the amount of data have made its automation indispensable. This thesis proposes an unsupervised method for anomaly detection in multivariate time series called USAD. However, deep neural network methods suffer from a limitation in their ability to extract features from the data since they only rely on local information. To improve the performance of these methods, this thesis presents a feature engineering strategy that introduces non-local information. Finally, this thesis proposes a comparison of sixteen time series anomaly detection methods to understand whether the explosion in complexity of neural network methods proposed in the current literature is really necessary
Orman, Keziban. "Contribution to the interpretation of evolving communities in complex networks : Application to the study of social interactions". Thesis, Lyon, INSA, 2014. http://www.theses.fr/2014ISAL0072/document.
Texto completo da fonteComplex Networks constitute a convenient tool to model real-world complex systems. For this reason, they have become very popular in the last decade. Many tools exist to study complex networks. Among them, community detection is one of the most important. A community is roughly defined as a group of nodes more connected internally than to the rest of the network. In the literature, this intuitive definition has been formalized in many ways, leading to countless different methods and variants to detect communities. In the large majority of cases, the result of these methods is set of node groups in which each node group corresponds to a community. From the applicative point of view, the meaning of these groups is as important as their detection. However, although the task of detecting communities in itself took a lot of attraction, the problem of interpreting them has not been properly tackled until now. In this thesis, we see the interpretation of communities as a problem independent from the community detection process, consisting in identifying the most characteristic features of communities. We break it down into two sub-problems: 1) finding an appropriate way to represent a community and 2) objectively selecting the most characteristic parts of this representation. To solve them, we take advantage of the information encoded in dynamic attributed networks. We propose a new representation of communities under the form of temporal sequences of topological measures and attribute values associated to individual nodes. We then look for emergent sequential patterns in this dataset, in order to identify the most characteristic community features. We perform a validation of our framework on artificially generated dynamic attributed networks. At this occasion, we study its behavior relatively to changes in the temporal evolution of the communities, and to the distribution and evolution of nodal features. We also apply our framework to real-world systems: a DBLP network of scientific collaborations, and a LastFM network of social and musical interactions. Our results show that the detected communities are not completely homogeneous, in the sense several node topic or interests can be identified for a given community. Some communities are composed of smaller groups of nodes which tend to evolve together as time goes by, be it in terms of individual (attributes, topological measures) or relational (community migration) features. The detected anomalies generally fit some generic profiles: nodes misplaced by the community detection tool, nodes relatively similar to their communities, but also significantly different on certain features and/or not synchronized with their community evolution, and finally nodes with completely different interests
Livros sobre o assunto "Networks anomalies detection"
T, Feagin, Overland D, University of Houston--Clear Lake. Research Institute for Computing and Information Systems. e Lyndon B. Johnson Space Center., eds. Communications and tracking expert systems study. [Houston, Tex.]: Research Institute for Computing and Information Systems, University of Houston--Clear Lake, 1987.
Encontre o texto completo da fonteParisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Packt Publishing, Limited, 2019.
Encontre o texto completo da fonteHands-On Artificial Intelligence for Cybersecurity: Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. de Gruyter GmbH, Walter, 2019.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Networks anomalies detection"
Krzysztoń, Mateusz, Marcin Lew e Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic". In Cybersecurity of Digital Service Chains, 83–102. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Texto completo da fonteAkashi, Osamu, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Mitsuru Maruyama e Toshiharu Sugawara. "Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents". In Ambient Networks, 181–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11568285_16.
Texto completo da fonteČermák, Milan, Pavel Čeleda e Jan Vykopal. "Detection of DNS Traffic Anomalies in Large Networks". In Lecture Notes in Computer Science, 215–26. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13488-8_20.
Texto completo da fonteDawoud, Ahmed, Seyed Shahristani e Chun Raun. "Unsupervised Deep Learning for Software Defined Networks Anomalies Detection". In Lecture Notes in Computer Science, 167–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-59540-4_9.
Texto completo da fonteHossain, Md Azam, Iqram Hussain, Baseem Al-Athwari e Santosh Dahit. "Network Traffic Anomalies Detection Using Machine Learning Algorithm: A Performance Study". In Lecture Notes in Networks and Systems, 274–82. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9480-6_26.
Texto completo da fonteBhattacharya, Saurabh, e Manju Pandey. "Anomalies Detection on Contemporary Industrial Internet of Things Data for Securing Crucial Devices". In Lecture Notes in Networks and Systems, 11–20. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9228-5_2.
Texto completo da fonteLaRock, Timothy, Vahan Nanumyan, Ingo Scholtes, Giona Casiraghi, Tina Eliassi-Rad e Frank Schweitzer. "HYPA: Efficient Detection of Path Anomalies in Time Series Data on Networks". In Proceedings of the 2020 SIAM International Conference on Data Mining, 460–68. Philadelphia, PA: Society for Industrial and Applied Mathematics, 2020. http://dx.doi.org/10.1137/1.9781611976236.52.
Texto completo da fonteRomero, Santiago Felipe Luna, e Luis Serpa-Andrade. "Intelligent Agent Proposal in a Building Electricity Monitoring System for Anomalies’ Detection Using Reinforcement Learning". In Lecture Notes in Networks and Systems, 207–15. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80624-8_26.
Texto completo da fonteRajendra, S., Chittaranjan Pradhan e Jayavel Kanniappan. "An Adaptive Detection Mechanism for IoT Devices Anomalies Using AI/ML Based on User Pattern". In Lecture Notes in Networks and Systems, 13–25. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9043-6_2.
Texto completo da fonteWankhade, Kapil Keshao, Snehlata Dongre, Ravi Chandra, Kishore V. Krishnan e Srikanth Arasavilli. "Machine Learning-Based Detection of Attacks and Anomalies in Industrial Internet of Things (IIoT) Networks". In Applied Soft Computing and Communication Networks, 91–109. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-2004-0_7.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Networks anomalies detection"
Huang, Hao, Tapan Shah, John Karigiannis e Scott Evans. "Deep Root Cause Analysis: Unveiling Anomalies and Enhancing Fault Detection in Industrial Time Series". In 2024 International Joint Conference on Neural Networks (IJCNN), 1–8. IEEE, 2024. http://dx.doi.org/10.1109/ijcnn60899.2024.10650906.
Texto completo da fonteMosayebi, Reza, e Lutz Lampe. "Anomaly Detection in Optical Fiber: A Change-Point Detection Perspective". In Signal Processing in Photonic Communications, SpTh2G.4. Washington, D.C.: Optica Publishing Group, 2024. http://dx.doi.org/10.1364/sppcom.2024.spth2g.4.
Texto completo da fonteKolodziej, Joanna, Mateusz Krzyszton e Pawel Szynkiewicz. "Anomaly Detection In TCP/IP Networks". In 37th ECMS International Conference on Modelling and Simulation. ECMS, 2023. http://dx.doi.org/10.7148/2023-0542.
Texto completo da fonteLi, Jundong, Harsh Dani, Xia Hu e Huan Liu. "Radar: Residual Analysis for Anomaly Detection in Attributed Networks". In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/299.
Texto completo da fonteZhang, Jiaqiang, Senzhang Wang e Songcan Chen. "Reconstruction Enhanced Multi-View Contrastive Learning for Anomaly Detection on Attributed Networks". In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/330.
Texto completo da fonteLiu, Chen, Shibo He, Qihang Zhou, Shizhong Li e Wenchao Meng. "Large Language Model Guided Knowledge Distillation for Time Series Anomaly Detection". In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. California: International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/239.
Texto completo da fonteZhang, Zheng, e Liang Zhao. "Unsupervised Deep Subgraph Anomaly Detection (Extended Abstract)". In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/730.
Texto completo da fonteShekhar, Prashant, e Rahul Rai. "Anomaly Detection in Complex Spatiotemporal Networks Through Location Aware Geospatial Big Data Sets". In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59587.
Texto completo da fonteBarker, Jack W., e Toby P. Breckon. "PANDA: Perceptually Aware Neural Detection of Anomalies". In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 2021. http://dx.doi.org/10.1109/ijcnn52387.2021.9534399.
Texto completo da fonteLiu, Ninghao, Xiao Huang e Xia Hu. "Accelerated Local Anomaly Detection via Resolving Attributed Networks". In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/325.
Texto completo da fonteRelatórios de organizações sobre o assunto "Networks anomalies detection"
Kirichek, Galina, Vladyslav Harkusha, Artur Timenko e Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], fevereiro de 2020. http://dx.doi.org/10.31812/123456789/3743.
Texto completo da fonteTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, janeiro de 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Texto completo da fonteLeón, Carlos. Detecting anomalous payments networks: A dimensionality reduction approach. Banco de la República de Colombia, dezembro de 2019. http://dx.doi.org/10.32468/be.1098.
Texto completo da fonteValdez, Luis, e Alexander Heifetz. Detection of Anomalies in Environmental Gamma Radiation Background with Hopfield Artificial Neural Network - Consortium on Nuclear Security Technologies (CONNECT) Q3 Report. Office of Scientific and Technical Information (OSTI), janeiro de 2021. http://dx.doi.org/10.2172/1827413.
Texto completo da fonte