A survey of network anomaly detection techniques
M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
Scalable clustering algorithms for big data: A review
Clustering algorithms have become one of the most critical research areas in multiple
domains, especially data mining. However, with the massive growth of big data applications …
domains, especially data mining. However, with the massive growth of big data applications …
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
Clustering algorithms have emerged as an alternative powerful meta-learning tool to
accurately analyze the massive volume of data generated by modern applications. In …
accurately analyze the massive volume of data generated by modern applications. In …
A survey of anomaly detection techniques in financial domain
Anomaly detection is an important data analysis task. It is used to identify interesting and
emerging patterns, trends and anomalies from data. Anomaly detection is an important tool …
emerging patterns, trends and anomalies from data. Anomaly detection is an important tool …
Learning neural representations for network anomaly detection
M Nicolau, J McDermott - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
This paper proposes latent representation models for improving network anomaly detection.
Well-known anomaly detection algorithms often suffer from challenges posed by network …
Well-known anomaly detection algorithms often suffer from challenges posed by network …
[PDF][PDF] A survey on clustering techniques for big data mining
A Survey on Clustering Techniques for Big Data Mining Page 1 Indian Journal of Science and
Technology, Vol 9(3), DOI: 10.17485/ijst/2016/v9i3/75971, January 2016 ISSN (Print) …
Technology, Vol 9(3), DOI: 10.17485/ijst/2016/v9i3/75971, January 2016 ISSN (Print) …
Bitter harvest: Systematically fingerprinting low-and medium-interaction honeypots at internet scale
The current generation of low-and medium interaction honeypots uses off-the-shelf libraries
to provide the transport layer. We show that this architecture is fatally flawed because the …
to provide the transport layer. We show that this architecture is fatally flawed because the …
An investigation of performance analysis of anomaly detection techniques for big data in scada systems
Anomaly detection is an important aspect of data mining, where the main objective is to
identify anomalous or unusual data from a given dataset. However, there is no formal …
identify anomalous or unusual data from a given dataset. However, there is no formal …
[PDF][PDF] Comprehensive analysis & performance comparison of clustering algorithms for big data
A Nayyar, V Puri - Review of Computer Engineering Research, 2017 - researchgate.net
21st Century has marked high velocity of data generation not only in terms of size but also in
variety. Analyzing large data sets with different forms is also a challenging task. Data Mining …
variety. Analyzing large data sets with different forms is also a challenging task. Data Mining …
PPFSCADA: Privacy preserving framework for SCADA data publishing
Abstract Supervisory Control and Data Acquisition (SCADA) systems control and monitor
industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway …
industrial and critical infrastructure functions, such as electricity, gas, water, waste, railway …