A survey on urban traffic anomalies detection algorithms
This paper reviews the use of outlier detection approaches in urban traffic analysis. We
divide existing solutions into two main categories: flow outlier detection and trajectory outlier …
divide existing solutions into two main categories: flow outlier detection and trajectory outlier …
Orchestrating the development lifecycle of machine learning-based IoT applications: A taxonomy and survey
Machine Learning (ML) and Internet of Things (IoT) are complementary advances: ML
techniques unlock the potential of IoT with intelligence, and IoT applications increasingly …
techniques unlock the potential of IoT with intelligence, and IoT applications increasingly …
Gee: A gradient-based explainable variational autoencoder for network anomaly detection
QP Nguyen, KW Lim, DM Divakaran… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
This paper looks into the problem of detecting network anomalies by analyzing NetFlow
records. While many previous works have used statistical models and machine learning …
records. While many previous works have used statistical models and machine learning …
Discovering spatio-temporal causal interactions in traffic data streams
The detection of outliers in spatio-temporal traffic data is an important research problem in
the data mining and knowledge discovery community. However to the best of our …
the data mining and knowledge discovery community. However to the best of our …
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang… - Proceedings of the 9th …, 2009 - dl.acm.org
Statistical machine learning techniques have recently garnered increased popularity as a
means to improve network design and security. For intrusion detection, such methods build …
means to improve network design and security. For intrusion detection, such methods build …
[HTML][HTML] Dimensionality reduction using principal component analysis for network intrusion detection
KK Vasan, B Surendiran - Perspectives in Science, 2016 - Elsevier
Intrusion detection is the identification of malicious activities in a given network by analyzing
its traffic. Data mining techniques used for this analysis study the traffic traces and identify …
its traffic. Data mining techniques used for this analysis study the traffic traces and identify …
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized
signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic …
signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic …
[PDF][PDF] {SEPIA}:{Privacy-Preserving} aggregation of {Multi-Domain} network events and statistics
M Burkhart, M Strasser, D Many… - 19th USENIX Security …, 2010 - usenix.org
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data
of multiple parties. Although MPC has been studied substantially, building solutions that are …
of multiple parties. Although MPC has been studied substantially, building solutions that are …
Spatio-temporal compressive sensing and internet traffic matrices (extended version)
Despite advances in measurement technology, it is still challenging to reliably compile large-
scale network datasets. For example, because of flaws in the measurement systems or …
scale network datasets. For example, because of flaws in the measurement systems or …
Inferring the root cause in road traffic anomalies
We propose a novel two-step mining and optimization framework for inferring the root cause
of anomalies that appear in road traffic data. We model road traffic as a time-dependent flow …
of anomalies that appear in road traffic data. We model road traffic as a time-dependent flow …