Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis
Failure of application operations is one of the main causes of system-wide outages in cloud
environments. This particularly applies to DevOps operations, such as backup …
environments. This particularly applies to DevOps operations, such as backup …
Lightweight collaborative anomaly detection for the IoT using blockchain
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …
An intrusion detection scheme based on anomaly mining in Internet of Things
R Fu, K Zheng, D Zhang, Y Yang - 2011 - IET
Internet of things (IOT) is vulnerable to malicious attacks because of opening deployment
and limited resources. It's heterogeneous and distributed characters make conventional …
and limited resources. It's heterogeneous and distributed characters make conventional …
Tackling the big data 4 vs for anomaly detection
J Camacho, G Macia-Fernandez… - … IEEE conference on …, 2014 - ieeexplore.ieee.org
In this paper, a framework for anomaly detection and forensics in Big Data is introduced. The
framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied …
framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied …
Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning
The Industrial Internet of Things (IIoT) is an emerging technology that can promote the
development of industrial intelligence, improve production efficiency, and reduce …
development of industrial intelligence, improve production efficiency, and reduce …
Smart anomaly detection using data-driven techniques in iot edge: a survey
J Manokaran, G Vairavel - Proceedings of Third International Conference …, 2022 - Springer
In this article, we survey the different data-driven techniques for smart anomaly detection at
the Internet of Things (IoT) edge. Anomaly detection is a significant study issue because of …
the Internet of Things (IoT) edge. Anomaly detection is a significant study issue because of …
Anomaly detection methods for IIoT networks
IIoT networks are different from general IT networks such as office or business networks
where multiple various types of applications, protocols and traffic profiles are presented, and …
where multiple various types of applications, protocols and traffic profiles are presented, and …
Outlier detection in sensed data using statistical learning models for IoT
N Nesa, T Ghosh, I Banerjee - 2018 IEEE Wireless …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices are composed of millions of sensors that continuously sense
environmental parameters which are effectively fused to gain insights on a particular area or …
environmental parameters which are effectively fused to gain insights on a particular area or …
Machine learning techniques for security of Internet of Things (IoT) and fog computing systems
The Internet of Things (IoT) is a network of interconnected computing devices having the
ability to transfer data over a network, without needing human interaction. Software and …
ability to transfer data over a network, without needing human interaction. Software and …
Technical issues of forensic investigations in cloud computing environments
D Birk, C Wegener - 2011 Sixth IEEE international workshop on …, 2011 - ieeexplore.ieee.org
Cloud Computing is arguably one of the most discussed information technologies today. It
presents many promising technological and economical opportunities. However, many …
presents many promising technological and economical opportunities. However, many …