[PDF][PDF] Обзор методов обнаружения аномалий в потоках данных
ВП Шкодырев, КИ Ягафаров… - Proc. of the Second …, 2017 - ceur-ws.org
В работе приведен обзор существующих методов и алгоритмов обнаружения
аномалий с целью структуризации имеющихся данных и последующего отбора …
аномалий с целью структуризации имеющихся данных и последующего отбора …
AnRAD: A neuromorphic anomaly detection framework for massive concurrent data streams
The evolution of high performance computing technologies has enabled the large-scale
implementation of neuromorphic models and pushed the research in computational …
implementation of neuromorphic models and pushed the research in computational …
Detecting anomalies in sequential data augmented with new features
X Kong, Y Bi, DH Glass - Artificial Intelligence Review, 2020 - Springer
This paper presents a new weighted local outlier factor method for anomaly detection, which
is underpinned with three novel components:(1) a piecewise linear representation defined …
is underpinned with three novel components:(1) a piecewise linear representation defined …
Detection of Electromagnetic Seismic Precursors from Swarm Data by Enhanced Martingale Analytics
The detection of seismic activity precursors as part of an alarm system will provide
opportunities for minimization of the social and economic impact caused by earthquakes. It …
opportunities for minimization of the social and economic impact caused by earthquakes. It …
[PDF][PDF] Customer churn prediction, segmentation and fraud detection in telecommunication industry
Every telecommunication market player is launching innovative business models and
offering better services which in turn have increased the cost of retaining customers …
offering better services which in turn have increased the cost of retaining customers …
Self-structured confabulation network for fast anomaly detection and reasoning
Inference models such as the confabulation network are particularly useful in anomaly
detection applications because they allow introspection to the decision process. However …
detection applications because they allow introspection to the decision process. However …
Signatureless Anomalous Behavior Detection in Information Systems
The early detection of cyber threats with cyber-attacks adapted to the nature of information
systems is a crucial cybersecurity problem. This problem and the task of recognizing normal …
systems is a crucial cybersecurity problem. This problem and the task of recognizing normal …
Anomaly detection in vessel track data
M Smith - 2014 - ora.ox.ac.uk
This thesis introduces novelty detection techniques that use a combination of Gaussian
processes, extreme value theory and divergence measurement to identify anomalous …
processes, extreme value theory and divergence measurement to identify anomalous …
Malicious source code detection using a translation model
C Tsfaty, M Fire - Patterns, 2023 - cell.com
Modern software development often relies on open-source code sharing. Open-source code
reuse, however, allows hackers to access wide developer communities, thereby potentially …
reuse, however, allows hackers to access wide developer communities, thereby potentially …
Independent and Sequential Ensemble Methods for Anomaly Detection
MS Di Blasi - 2023 - webthesis.biblio.polito.it
Anomaly detection problems are particularly important in various real-word contest such as
fraud detection, finance, intrusion detection and cyber-security. Several methods that are …
fraud detection, finance, intrusion detection and cyber-security. Several methods that are …