Survey of intrusion detection systems: techniques, datasets and challenges
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction
M Landauer, F Skopik, B Stojanović, A Flatscher… - International Journal of …, 2025 - Springer
Understanding the current threat landscape as well as timely detection of imminent attacks
are primary objectives of cyber security. Through time-series modeling of security data, such …
are primary objectives of cyber security. Through time-series modeling of security data, such …
Construction of bivariate asymmetric copulas
S Mukherjee, Y Lee, JM Kim, J Jang… - Communications for …, 2018 - koreascience.kr
Copulas are a tool for constructing multivariate distributions and formalizing the dependence
structure between random variables. From copula literature review, there are a few …
structure between random variables. From copula literature review, there are a few …
Multivariate unsupervised machine learning for anomaly detection in enterprise applications
D Elsner, P Aleatrati Khosroshahi… - 2019 - scholarspace.manoa.hawaii.edu
Existing application performance management (APM) solutions lack robust anomaly
detection capabilities and root cause analysis techniques, that do not require manual efforts …
detection capabilities and root cause analysis techniques, that do not require manual efforts …
Détection d'intrusion basée sur l'analyse de compteurs matériels pour des objets connectés
M Bourdon - 2021 - laas.hal.science
Les objets connectés, qui forment aujourd'hui l'Internet des objets ou IoT, sont de plus en
plus nombreux et offrent une grande variété de fonctionnalités. Ils font cependant face à de …
plus nombreux et offrent une grande variété de fonctionnalités. Ils font cependant face à de …
[图书][B] On the Use of Copulas in Modern Process Monitoring
YL Liao - 2022 - search.proquest.com
In today's modern industry, autocorrelated processes are common due to the speed at which
measurements can be obtained. The general strategy for monitoring autocorrelated …
measurements can be obtained. The general strategy for monitoring autocorrelated …
Intrusion detection system in IoT networks using SVM-PSO classification
SAM Al-Rubaye - 2022 - openaccess.altinbas.edu.tr
As the subfields of computer science and information technology continue to expand at a
dizzying rate, efforts are made to promote and improve scientific and technical initiatives …
dizzying rate, efforts are made to promote and improve scientific and technical initiatives …
Anomaly detection on a real-time server using decision trees step by step procedure
G Chaaya, H Maalouf - 2017 8th International Conference on …, 2017 - ieeexplore.ieee.org
Anomaly detection is the process of finding outlying records from a given data set. The aim
of this paper is to study a well-known anomaly detection technique on the “Short Message …
of this paper is to study a well-known anomaly detection technique on the “Short Message …
[PDF][PDF] Intrusion Detection Systems
A Margaritis - ikee.lib.auth.gr
With the continuous expansion of the Internet, computer attacks are expanding not only in
number but also in variety: ransomware is on the rise like never before, and zero-day …
number but also in variety: ransomware is on the rise like never before, and zero-day …
A Highly Efficient Intrusion Detection and Packet Tracking Based on Game Theory Approach
G Sadineni, M Archana… - 2021 Emerging Trends in …, 2021 - ieeexplore.ieee.org
Wireless Sensing Networks (WSNs) offer excellent environmental monitoring capabilities
and use many interesting applications in advanced network applications. The problem is …
and use many interesting applications in advanced network applications. The problem is …