[PDF][PDF] Обзор методов обнаружения аномалий в потоках данных

ВП Шкодырев, КИ Ягафаров… - Proc. of the Second …, 2017 - ceur-ws.org
В работе приведен обзор существующих методов и алгоритмов обнаружения
аномалий с целью структуризации имеющихся данных и последующего отбора …

AnRAD: A neuromorphic anomaly detection framework for massive concurrent data streams

Q Chen, R Luley, Q Wu, M Bishop… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
The evolution of high performance computing technologies has enabled the large-scale
implementation of neuromorphic models and pushed the research in computational …

Detecting anomalies in sequential data augmented with new features

X Kong, Y Bi, DH Glass - Artificial Intelligence Review, 2020 - Springer
This paper presents a new weighted local outlier factor method for anomaly detection, which
is underpinned with three novel components:(1) a piecewise linear representation defined …

Detection of Electromagnetic Seismic Precursors from Swarm Data by Enhanced Martingale Analytics

S Harrigan, Y Bi, M Huang, C O'Neill, W Zhai, J Sun… - Sensors, 2024 - mdpi.com
The detection of seismic activity precursors as part of an alarm system will provide
opportunities for minimization of the social and economic impact caused by earthquakes. It …

[PDF][PDF] Customer churn prediction, segmentation and fraud detection in telecommunication industry

A Rehman, AR Ali - ASE BigData/SocialInformatics/PASSAT …, 2014 - researchgate.net
Every telecommunication market player is launching innovative business models and
offering better services which in turn have increased the cost of retaining customers …

Self-structured confabulation network for fast anomaly detection and reasoning

Q Chen, Q Wu, M Bishop… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
Inference models such as the confabulation network are particularly useful in anomaly
detection applications because they allow introspection to the decision process. However …

Signatureless Anomalous Behavior Detection in Information Systems

V Tkach, A Kudin, V Zadiraka, I Shvidchenko - Cybernetics and Systems …, 2023 - Springer
The early detection of cyber threats with cyber-attacks adapted to the nature of information
systems is a crucial cybersecurity problem. This problem and the task of recognizing normal …

Anomaly detection in vessel track data

M Smith - 2014 - ora.ox.ac.uk
This thesis introduces novelty detection techniques that use a combination of Gaussian
processes, extreme value theory and divergence measurement to identify anomalous …

Malicious source code detection using a translation model

C Tsfaty, M Fire - Patterns, 2023 - cell.com
Modern software development often relies on open-source code sharing. Open-source code
reuse, however, allows hackers to access wide developer communities, thereby potentially …

Independent and Sequential Ensemble Methods for Anomaly Detection

MS Di Blasi - 2023 - webthesis.biblio.polito.it
Anomaly detection problems are particularly important in various real-word contest such as
fraud detection, finance, intrusion detection and cyber-security. Several methods that are …