A survey of network anomaly detection techniques

M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …

Scalable clustering algorithms for big data: A review

MA Mahdi, KM Hosny, I Elhenawy - IEEE Access, 2021 - ieeexplore.ieee.org
Clustering algorithms have become one of the most critical research areas in multiple
domains, especially data mining. However, with the massive growth of big data applications …

A survey of clustering algorithms for big data: Taxonomy and empirical analysis

A Fahad, N Alshatri, Z Tari, A Alamri… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Clustering algorithms have emerged as an alternative powerful meta-learning tool to
accurately analyze the massive volume of data generated by modern applications. In …

A survey of anomaly detection techniques in financial domain

M Ahmed, AN Mahmood, MR Islam - Future Generation Computer Systems, 2016 - Elsevier
Anomaly detection is an important data analysis task. It is used to identify interesting and
emerging patterns, trends and anomalies from data. Anomaly detection is an important tool …

Learning neural representations for network anomaly detection

M Nicolau, J McDermott - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
This paper proposes latent representation models for improving network anomaly detection.
Well-known anomaly detection algorithms often suffer from challenges posed by network …

[PDF][PDF] A survey on clustering techniques for big data mining

T Sajana, CS Rani, KV Narayana - Indian journal of Science and …, 2016 - researchgate.net
A Survey on Clustering Techniques for Big Data Mining Page 1 Indian Journal of Science and
Technology, Vol 9(3), DOI: 10.17485/ijst/2016/v9i3/75971, January 2016 ISSN (Print) …

Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale

A Vetterl, R Clayton - 12th USENIX Workshop on Offensive Technologies …, 2018 - usenix.org
The current generation of low-and medium interaction honeypots uses off-the-shelf libraries
to provide the transport layer. We show that this architecture is fatally flawed because the …

An investigation of performance analysis of anomaly detection techniques for big data in scada systems

M Ahmed, A Anwar, AN Mahmood… - EAI Endorsed …, 2015 - publications.eai.eu
Anomaly detection is an important aspect of data mining, where the main objective is to
identify anomalous or unusual data from a given dataset. However, there is no formal …

[PDF][PDF] Comprehensive analysis & performance comparison of clustering algorithms for big data

A Nayyar, V Puri - Review of Computer Engineering Research, 2017 - researchgate.net
21st Century has marked high velocity of data generation not only in terms of size but also in
variety. Analyzing large data sets with different forms is also a challenging task. Data Mining …

PPFSCADA: Privacy preserving framework for SCADA data publishing

A Fahad, Z Tari, A Almalawi, A Goscinski, I Khalil… - Future generation …, 2014 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems control and monitor
industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway …