A survey of outlier detection in high dimensional data streams
The rapid evolution of technology has led to the generation of high dimensional data
streams in a wide range of fields, such as genomics, signal processing, and finance. The …
streams in a wide range of fields, such as genomics, signal processing, and finance. The …
PCA-based multivariate statistical network monitoring for anomaly detection
J Camacho, A Pérez-Villegas, P García-Teodoro… - Computers & …, 2016 - Elsevier
The multivariate approach based on Principal Component Analysis (PCA) for anomaly
detection received a lot of attention from the networking community one decade ago, mainly …
detection received a lot of attention from the networking community one decade ago, mainly …
Fast tensor factorization for accurate internet anomaly detection
Detecting anomalous traffic is a critical task for advanced Internet management. Many
anomaly detection algorithms have been proposed recently. However, constrained by their …
anomaly detection algorithms have been proposed recently. However, constrained by their …
A PCA-based method for IoT network traffic anomaly detection
DH Hoang, HD Nguyen - 2018 20th International conference …, 2018 - ieeexplore.ieee.org
Network operators need effective tools to quickly detect anomalies in traffic data for
identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT …
identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT …
Anomaly detection for cellular networks using big data analytics
Broadband connectivity and mobile technology have been widely applied in the world. With
these advanced technologies, the proliferation of smart devices and their applications by …
these advanced technologies, the proliferation of smart devices and their applications by …
Network intrusion detection using clustering and gradient boosting
P Verma, S Anwar, S Khan… - 2018 9th International …, 2018 - ieeexplore.ieee.org
An unauthorized activity on the network is called network intrusion and device or software
application which monitors the network parameters in order to detect such an intrusion is …
application which monitors the network parameters in order to detect such an intrusion is …
Applications of sketches in network traffic measurement: A survey
Accurate and timely network traffic measurement is essential for network status monitoring,
network fault analysis, network intrusion detection, and network security management. With …
network fault analysis, network intrusion detection, and network security management. With …
Graph based tensor recovery for accurate internet anomaly detection
Detecting anomalous traffic is a crucial task of managing networks. Many anomaly detection
algorithms have been proposed recently. However, constrained by their matrix-based traffic …
algorithms have been proposed recently. However, constrained by their matrix-based traffic …
A new instrumented approach for translating American Sign Language into sound and text
JL Hernandez-Rebollar… - … on Automatic Face …, 2004 - ieeexplore.ieee.org
This work discusses an approach for capturing and translating isolated gestures of American
Sign Language into spoken and written words. The instrumented part of the system …
Sign Language into spoken and written words. The instrumented part of the system …
Deep learning detection of anomalous patterns from bus trajectories for traffic insight analysis
Existing data-driven methods for traffic anomaly detection are modeled on taxi trajectory
datasets. The concern is that the data may contain much inaccuracy about the actual traffic …
datasets. The concern is that the data may contain much inaccuracy about the actual traffic …