A comparative study of anomaly detection schemes in network intrusion detection
… anomaly detection schemes for identifying different network intrusions. Several existing
supervised and unsupervised anomaly detection schemes … appropriate when detecting attacks …
supervised and unsupervised anomaly detection schemes … appropriate when detecting attacks …
[PDF][PDF] A novel anomaly detection scheme based on principal component classifier
… From the above experimental results, our proposed anomaly detection scheme based on
the principal components works effectively in identifying the attacks. The only comparable …
the principal components works effectively in identifying the attacks. The only comparable …
A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks
H Nakayama, S Kurosawa, A Jamalipour… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
… anomaly detection method becomes imperative to thwart the malicious attacks against it. In
this paper, we propose a new anomaly detection scheme … conventional detection schemes in …
this paper, we propose a new anomaly detection scheme … conventional detection schemes in …
An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks
… 3 The Proposed Hybrid Anomaly Detection Scheme In this section, we propose a new hybrid
anomaly detection scheme applied in WSNs. For detection of the hybrid anomaly, the entire …
anomaly detection scheme applied in WSNs. For detection of the hybrid anomaly, the entire …
A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms
… In the rest of this section, we will present the anomaly detection schemes based on (1)
machine learning algorithms; (2) federated learning; and (3) data sources and dimensions. …
machine learning algorithms; (2) federated learning; and (3) data sources and dimensions. …
A distributed sensing data anomaly detection scheme
C Yin, B Li, Z Yin - Computers & Security, 2020 - Elsevier
… in IoT, this paper proposes an anomaly detection method for sensing data streams based on
… data anomaly detection model, the improved confidence interval is used to detect whether …
… data anomaly detection model, the improved confidence interval is used to detect whether …
Anomaly detection: A survey
… anomaly detection, we provide a detailed discussion of the application domains where anomaly
detection … notion of an anomaly, the different aspects of the anomaly detection problem, …
detection … notion of an anomaly, the different aspects of the anomaly detection problem, …
LogNADS: Network anomaly detection scheme based on log semantics representation
X Liu, W Liu, X Di, J Li, B Cai, W Ren, H Yang - Future Generation …, 2021 - Elsevier
… sequential anomaly detection, this paper proposes a network anomaly detection scheme
LogNADS … Furthermore, to better detect the sequential anomalies, we utilize the sliding window …
LogNADS … Furthermore, to better detect the sequential anomalies, we utilize the sliding window …
An efficient cache-based access anomaly detection scheme
… detection of an anomaly is of dubious value. Existing methods for on-the-fly access anomaly
detection … an efficient cachebased access anomaly detection scheme that piggybacks on the …
detection … an efficient cachebased access anomaly detection scheme that piggybacks on the …
Principal component-based anomaly detection scheme
… In this chapter, a novel anomaly detection scheme that uses a robust principal component
classifier (PCC) to handle computer network security problems is proposed. An intrusion …
classifier (PCC) to handle computer network security problems is proposed. An intrusion …