scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "ANOMALY detection (Computer security)"

1 - 10 of 7,173 results for
 "ANOMALY detection (Computer security)"
Results per page:

Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p1067-1086. 20p.

Abstract: The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space i...

View details

CRND: An Unsupervised Learning Method to Detect Network Anomaly.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 10/28/2022, p1-9. 9p.

Abstract: Network anomaly detection system (NADS) is one of the most important methods to maintain network system security. At present, network anomaly detection models based on deep learning have become a research hotspot in the area because of their advantage ...

View details

Compared Insights on Machine-Learning Anomaly Detection for Process Control Feature.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 2, p4033-4049. 17p.

Abstract: : Anomaly detection is becoming increasingly significant in industrial cyber security, and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks. H...

View details

PERFORMANCE MEASUREMENT WITH HIGH-PERFORMANCE COMPUTER USING HW-GA ANOMALY-DETECTION ALGORITHMS FOR STREAMING DATA.

Publication Type: Academic Journal

Source(s): Computer Science. 2022, Vol. 23 Issue 3, p397-410. 14p.

Abstract: Anomaly detection for streaming real-time data is very important; more significant is the performance of an algorithm in order to meet real-time requirements. Anomaly detection is very crucial in every sector because, by knowing what is going wrong wit...

View details

Recurrent Autoencoder Ensembles for Brake Operating Unit Anomaly Detection on Metro Vehicles.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p1-14. 14p.

Abstract: The anomaly detection of the brake operating unit (BOU) in the brake systems on metro vehicle is critical for the safety and reliability of the trains. On the other hand, current periodic inspection and maintenance are unable to detect anomalies in an ...

View details

Research on Security Anomaly Detection for Big Data Platforms Based on Quantum Optimization Clustering.

Publication Type: Academic Journal

Source(s): Mathematical Problems in Engineering. 8/26/2022, p1-10. 10p.

Abstract: Due to the explosive growth of data in the Internet, more and more applications are being deployed on Big Data platforms. However, as the scale of data continues to increase, the probability of anomalies in the platform is also increasing. However, tra...

View details

Arithmetic Optimization with Deep Learning Enabled Anomaly Detection in Smart City.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 73 Issue 1, p381-395. 15p.

Abstract: In recent years, Smart City Infrastructures (SCI) have become familiar whereas intelligent models have been designed to improve the quality of living in smart cities. Simultaneously, anomaly detection in SCI has become a hot research topic and is widel...

View details

Computer Network Intrusion Anomaly Detection Based on Rough Fourier Fast Algorithm.

Publication Type: Academic Journal

Source(s): Mathematical Problems in Engineering. 9/29/2022, Vol. 2022, p1-9. 9p.

Authors:

Abstract: Since there is a close relationship between network information security attack events and time complexity, it is necessary to count the degree of correlation between the current connection record and the connection record within a certain period of ti...

View details

Anomaly Detection for Internet of Things Cyberattacks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2022, Vol. 72 Issue 1, p261-279. 19p.

Abstract: The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives. The IoT revolution has redefined digital services in different domains by improving efficiency, produc...

View details

Research on DUAL-ADGAN Model for Anomaly Detection Method in Time-Series Data.

Publication Type: Academic Journal

Source(s): Computational Intelligence & Neuroscience. 10/26/2022, Vol. 2022, p1-18. 18p.

Abstract: In recent years, anomaly detection techniques in time-series data have been widely used in manufacturing, cybersecurity, and other fields. Meanwhile, various anomaly detection models based on generative adversarial networks (GAN) are gradually used in ...

View details
sponsored