Group anomaly detection based on Bayesian framework with genetic algorithm
W Song, W Dong, L Kang - Information Sciences, 2020 - Elsevier
Anomaly detection is an important application field of evolutionary algorithm. Unlike
traditionly anomaly detection, group anomaly detection aims to discover the anomalous …
traditionly anomaly detection, group anomaly detection aims to discover the anomalous …
Detection of attackers in services using anomalous host behavior based on traffic flow statistics
Y Sawaya, A Kubota, Y Miyake - 2011 IEEE/IPSJ International …, 2011 - ieeexplore.ieee.org
Flow-based attacker detection is a common way to detect malicious hosts at a router on a
high-traffic network with fewer computing resources. The most challenging aspect is to …
high-traffic network with fewer computing resources. The most challenging aspect is to …
Outlier detection in 802.11 wireless access points using hidden markov models
In 802.11 Wireless Networks, detecting faulty equipment, poor radio conditions, and
changes in user behavior through anomaly detection techniques is of great importance in …
changes in user behavior through anomaly detection techniques is of great importance in …
Positive selection-inspired anomaly detection model with artificial immune
LX Peng, YF Chen - 2014 International Conference on Cyber …, 2014 - ieeexplore.ieee.org
Network anomaly detection has become the promising aspect of intrusion detection. The
existing anomaly detection models depict the detection profiles with a static way, which lack …
existing anomaly detection models depict the detection profiles with a static way, which lack …
Switch architectures for small-buffered optical packet switched networks
O Alparslan, S Arakawa… - 2007 12th IEEE …, 2007 - ieeexplore.ieee.org
One of the difficulties of optical packet switched networks is buffering optical packets in the
network. Currently, one solution that can be used for buffering in the optical domain is using …
network. Currently, one solution that can be used for buffering in the optical domain is using …
Outlier Detection in 802.11 Wireless Access Points Using Hidden Markov Models
Abstract In 802.11 Wireless Networks, detecting faulty equipment, poor radio conditions, and
changes in user behavior through anomaly detection techniques is of great importance in …
changes in user behavior through anomaly detection techniques is of great importance in …
[PDF][PDF] Caracterización de Algoritmos de Cifrado para la Comunicación Segura en Dispositivos Móviles Characterization of Encoding Algorithms for Secure …
JJ Ruíz-Lagunas, JC Olivares-Rojas… - academia.edu
Los dispositivos móviles se caracterizan por ser sistemas de comunicación ampliamente
difundidos, debido a su fácil acceso, conectividad y versatilidad. Tales dispositivos cuentan …
difundidos, debido a su fácil acceso, conectividad y versatilidad. Tales dispositivos cuentan …