Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network

MS Parwez, DB Rawat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The next generation wireless networks are expected to operate in fully automated fashion to
meet the burgeoning capacity demand and to serve users with superior quality of …

Call detail records driven anomaly detection and traffic prediction in mobile cellular networks

K Sultan, H Ali, Z Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile networks possess information about the users as well as the network. Such
information is useful for making the network end-to-end visible and intelligent. Big data …

Deep learning-based risk management of financial market in smart grid

T Teng, L Ma - Computers and Electrical Engineering, 2022 - Elsevier
Smart grid control systems (SGCSs) become more vulnerable to cyber-attacks because of
the combination of the Internet of Things and communication systems. Conventional …

Causalconvlstm: Semi-supervised log anomaly detection through sequence modeling

S Yen, M Moh, TS Moh - 2019 18th IEEE International …, 2019 - ieeexplore.ieee.org
Computer systems utilize logging to record events of interest. These logs are a rich source of
information, and can be analyzed to detect attacks, failures, and many other issues. Due to …

Wavelets on graphs with application to transportation networks

DM Mohan, MT Asif, N Mitrovic… - … IEEE Conference on …, 2014 - ieeexplore.ieee.org
The technological advancements in Intelligent Transport Systems have made it possible to
acquire large amounts of traffic data in real-time. As a result, various data-mining techniques …

Big data driven anomaly detection for cellular networks

Q Zhu, L Sun - Ieee Access, 2020 - ieeexplore.ieee.org
Anomaly detection for large scale cellular networks can be used by network operators to
optimize network performance and enhance mobile user experience. This paper aims at …

Anomaly detection in smart grid traffic data for home area network

DM Menon, N Radhika - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Strengthening of Smart Grid functionalities has become the need of the 21st Century.
Security evolves to be the primary concern at the deployment level of Smart Grids. Cyber …

[PDF][PDF] Artificially intelligent cyberattacks

E Zouave, M Bruce, K Colde, M Jaitner, I Rodhe… - … FOI [Online] Available …, 2020 - uu.se
This report explores the possibilities and applications of artificial intelligence (AI) within the
various stages of a cyberattack. It is a literature review of the current state of the art in AI …

Assessing the impact of intra-cloud live migration on anomaly detection

S Simpson, AK Marnerides, M Watson… - 2014 IEEE 3rd …, 2014 - ieeexplore.ieee.org
Virtualized cloud environments have emerged as a necessity within modern unified ICT
infrastructures and have established themselves as a reliable backbone for numerous …

[HTML][HTML] Toward preparing a knowledge base to explore potential drugs and biomedical entities related to COVID-19: automated computational approach

JY Khan, MTI Khondaker, IT Hoque… - JMIR medical …, 2020 - medinform.jmir.org
Background: Novel coronavirus disease 2019 (COVID-19) is taking a huge toll on public
health. Along with the non-therapeutic preventive measurements, scientific efforts are …