[HTML][HTML] Machine learning for Internet of Things data analysis: A survey

MS Mahdavinejad, M Rezvan, M Barekatain… - Digital Communications …, 2018 - Elsevier
Rapid developments in hardware, software, and communication technologies have
facilitated the emergence of Internet-connected sensory devices that provide observations …

A survey of network anomaly detection techniques

M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …

Logbert: Log anomaly detection via bert

H Guo, S Yuan, X Wu - 2021 international joint conference on …, 2021 - ieeexplore.ieee.org
Detecting anomalous events in online computer systems is crucial to protect the systems
from malicious attacks or malfunctions. System logs, which record detailed information of …

Deep learning for classification of malware system call sequences

B Kolosnjaji, A Zarras, G Webster, C Eckert - AI 2016: Advances in …, 2016 - Springer
The increase in number and variety of malware samples amplifies the need for improvement
in automatic detection and classification of the malware variants. Machine learning is a …

A review of novelty detection

MAF Pimentel, DA Clifton, L Clifton, L Tarassenko - Signal processing, 2014 - Elsevier
Novelty detection is the task of classifying test data that differ in some respect from the data
that are available during training. This may be seen as “one-class classification”, in which a …

Unsupervised salience learning for person re-identification

R Zhao, W Ouyang, X Wang - Proceedings of the IEEE …, 2013 - openaccess.thecvf.com
Human eyes can recognize person identities based on some small salient regions.
However, such valuable salient information is often hidden when computing similarities of …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

Toward supervised anomaly detection

N Görnitz, M Kloft, K Rieck, U Brefeld - Journal of Artificial Intelligence …, 2013 - jair.org
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem
from adversarial or unlikely events with unknown distributions. However, the predictive …

Intrusion detection by machine learning: A review

CF Tsai, YF Hsu, CY Lin, WY Lin - expert systems with applications, 2009 - Elsevier
The popularity of using Internet contains some risks of network attacks. Intrusion detection is
one major research problem in network security, whose aim is to identify unusual access or …

Checking app behavior against app descriptions

A Gorla, I Tavecchia, F Gross, A Zeller - Proceedings of the 36th …, 2014 - dl.acm.org
How do we know a program does what it claims to do? After clustering Android apps by their
description topics, we identify outliers in each cluster with respect to their API usage. A" …