[HTML][HTML] Anomaly detection in COVID-19 time-series data
Anomaly detection and explanation in big volumes of real-world medical data, such as those
pertaining to COVID-19, pose some challenges. First, we are dealing with time-series data …
pertaining to COVID-19, pose some challenges. First, we are dealing with time-series data …
[HTML][HTML] BR4DQ: a methodology for grouping business rules for data quality evaluation
Data quality evaluation is built upon data quality measurement results.“Data quality
evaluation” uses the “data quality rules” representing the risk appetite of the organization to …
evaluation” uses the “data quality rules” representing the risk appetite of the organization to …
An interactive data quality test approach for constraint discovery and fault detection
Data quality tests validate heterogeneous data to detect violations of syntactic and semantic
constraints. The specification of these constraints can be incomplete because domain …
constraints. The specification of these constraints can be incomplete because domain …
Data warehouse and data quality-an overview
Almost every company today is collecting and storing data for later analysis and business
decision making in some kind of repository, usually a data warehouse. In order for decision …
decision making in some kind of repository, usually a data warehouse. In order for decision …
Detecting data accuracy issues in textual geographical data by a clustering-based approach
MA Pellegrino, L Postiglione, V Scarano - … of the 3rd ACM India Joint …, 2021 - dl.acm.org
Data are published to encourage data exploitation. However, data quality issues threaten
data consumption and require data consumers investing time and effort in data cleansing …
data consumption and require data consumers investing time and effort in data cleansing …
Simulating measurement attacks in a scada system testbed
B Reutimann, I Ray - Critical Infrastructure Protection XV: 15th IFIP WG …, 2022 - Springer
Industrial control systems are target-rich environments for cyber criminals, terrorists and
advanced persistent threats. Researchers have investigated various types of industrial …
advanced persistent threats. Researchers have investigated various types of industrial …
[PDF][PDF] Simulating and Detecting Measurement Attacks in SCADA Testbeds
B Reutimann, I Ray - Rays Cyber Research Lab, 2021 - academia.edu
Industrial control systems (ICS) are an increasingly targetrich environment for cyber-
criminals, terrorists, and advanced persistent threats. Previously researchers have looked …
criminals, terrorists, and advanced persistent threats. Previously researchers have looked …
Anomaly Detection and Explanation in Big Data
H Homayouni - 2021 - search.proquest.com
Data quality tests are used to validate the data stored in databases and data warehouses,
and to detect violations of syntactic and semantic constraints. Domain experts grapple with …
and to detect violations of syntactic and semantic constraints. Domain experts grapple with …
Applications of Simulation in the Evaluation of SCADA and ICS Security
BR Reutimann - 2020 - search.proquest.com
Power grids, gas pipelines, and manufacturing centers provide an interesting challenge for
cybersecurity research. Known as supervisory control and data acquisition systems …
cybersecurity research. Known as supervisory control and data acquisition systems …
[PDF][PDF] ADQuaTe2: A Data Quality Test Approach for Automated Constraint Discovery and Fault Detection.
The quality of data is extremely important for data analytics. Data quality tests typically
involve checking constraints specified by domain experts. Existing approaches detect trivial …
involve checking constraints specified by domain experts. Existing approaches detect trivial …