Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

A comprehensive survey and taxonomy of the SVM-based intrusion detection systems

M Mohammadi, TA Rashid, SHT Karim… - Journal of Network and …, 2021 - Elsevier
The increasing number of security attacks have inspired researchers to employ various
classifiers, such as support vector machines (SVMs), to deal with them in Intrusion detection …

Improving security using SVM-based anomaly detection: issues and challenges

M Hosseinzadeh, AM Rahmani, B Vo, M Bidaki… - Soft Computing, 2021 - Springer
Security is one of the main requirements of the current computer systems, and recently it
gains much importance as the number and severity of malicious attacks increase …

The use of artificial intelligence based techniques for intrusion detection: a review

G Kumar, K Kumar, M Sachdeva - Artificial Intelligence Review, 2010 - Springer
The Internet connects hundreds of millions of computers across the world running on
multiple hardware and software platforms providing communication and commercial …

Automatic network intrusion detection: Current techniques and open issues

CA Catania, CG Garino - Computers & Electrical Engineering, 2012 - Elsevier
Automatic network intrusion detection has been an important research topic for the last
20years. In that time, approaches based on signatures describing intrusive behavior have …

The supervised normalized cut method for detecting, classifying, and identifying special nuclear materials

YT Yang, B Fishbain, DS Hochbaum… - INFORMS Journal …, 2014 - pubsonline.informs.org
The detection of illicit nuclear materials is a major tool in preventing and deterring nuclear
terrorism. The detection task is extremely difficult because of physical limitations of nuclear …

Discrete Wavelet Transform and One-Class Support Vector Machines for anomaly detection in wireless sensor networks

S Takianngam, W Usaha - 2011 international symposium on …, 2011 - ieeexplore.ieee.org
Data readings from wireless sensor networks (WSNs) may be abnormal due to detection of
unusual phenomena, limited battery power, sensor malfunction, or noise from the …

Anomaly Detection Using Machine Learning Techniques: A Systematic Review

S Jayabharathi, V Ilango - International Conference on Advances in Data …, 2022 - Springer
Anomaly detection is an observation of irregular, uncommon events that leads to a deviation
from the expected behaviour of a larger dataset. When data is multiplied exponentially, it …

[BOK][B] Automated network anomaly detection with learning, control and mitigation

D Ippoliti - 2014 - search.proquest.com
Anomaly detection is a challenging problem that has been researched within a variety of
application domains. In network intrusion detection, anomaly based techniques are …

[PDF][PDF] Classification of KDDCup99 Dataset for Intrusion Detection: A Survey

S Tiwari, A Dubey - scholar.archive.org
Detection of intrusion in network is necessary since the intrusion may create harm or attack
any application which needs to be detected and prevented. Although there are various …