[HTML][HTML] Machine learning-assisted in-situ adaptive strategies for the control of defects and anomalies in metal additive manufacturing

DR Gunasegaram, AS Barnard, MJ Matthews… - Additive …, 2024 - Elsevier
In metal additive manufacturing (AM), the material microstructure and part geometry are
formed incrementally. Consequently, the resulting part could be defect-and anomaly-free if …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Log-based anomaly detection with deep learning: How far are we?

VH Le, H Zhang - Proceedings of the 44th international conference on …, 2022 - dl.acm.org
Software-intensive systems produce logs for troubleshooting purposes. Recently, many
deep learning models have been proposed to automatically detect system anomalies based …

Experience report: Deep learning-based system log analysis for anomaly detection

Z Chen, J Liu, W Gu, Y Su, MR Lyu - arxiv preprint arxiv:2107.05908, 2021 - arxiv.org
Logs have been an imperative resource to ensure the reliability and continuity of many
software systems, especially large-scale distributed systems. They faithfully record runtime …

AutoLog: Anomaly detection by deep autoencoding of system logs

M Catillo, A Pecchia, U Villano - Expert Systems with Applications, 2022 - Elsevier
The use of system logs for detecting and troubleshooting anomalies of production systems
has been known since the early days of computers. In spite of the advances in the area, the …

Ai for it operations (aiops) on cloud platforms: Reviews, opportunities and challenges

Q Cheng, D Sahoo, A Saha, W Yang, C Liu… - arxiv preprint arxiv …, 2023 - arxiv.org
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big
data generated by IT Operations processes, particularly in cloud infrastructures, to provide …

Deep learning or classical machine learning? an empirical study on log-based anomaly detection

B Yu, J Yao, Q Fu, Z Zhong, H **e, Y Wu… - Proceedings of the 46th …, 2024 - dl.acm.org
While deep learning (DL) has emerged as a powerful technique, its benefits must be
carefully considered in relation to computational costs. Specifically, although DL methods …

LogUAD: Log unsupervised anomaly detection based on Word2Vec

J Wang, C Zhao, S He, Y Gu, O Alfarraj… - Computer Systems …, 2022 - zuscholars.zu.ac.ae
Abstract System logs record detailed information about system operation and are important
for analyzing the system's operational status and performance. Rapid and accurate …

[HTML][HTML] Anomaly detection method for multivariate time series data of oil and gas stations based on digital twin and mtad-gan

Y Lian, Y Geng, T Tian - Applied Sciences, 2023 - mdpi.com
Due to the complexity of the oil and gas station system, the operational data, with various
temporal dependencies and inter-metric dependencies, has the characteristics of diverse …

R-caid: Embedding root cause analysis within provenance-based intrusion detection

A Goyal, G Wang, A Bates - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
In modern enterprise security, endpoint detection products fire an alert when process activity
matches known attack behavior patterns. Human analysts then perform Root Cause …