Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems
The increasing number of security attacks have inspired researchers to employ various
classifiers, such as support vector machines (SVMs), to deal with them in Intrusion detection …
classifiers, such as support vector machines (SVMs), to deal with them in Intrusion detection …
Improving security using SVM-based anomaly detection: issues and challenges
Security is one of the main requirements of the current computer systems, and recently it
gains much importance as the number and severity of malicious attacks increase …
gains much importance as the number and severity of malicious attacks increase …
The use of artificial intelligence based techniques for intrusion detection: a review
The Internet connects hundreds of millions of computers across the world running on
multiple hardware and software platforms providing communication and commercial …
multiple hardware and software platforms providing communication and commercial …
Automatic network intrusion detection: Current techniques and open issues
CA Catania, CG Garino - Computers & Electrical Engineering, 2012 - Elsevier
Automatic network intrusion detection has been an important research topic for the last
20years. In that time, approaches based on signatures describing intrusive behavior have …
20years. In that time, approaches based on signatures describing intrusive behavior have …
The supervised normalized cut method for detecting, classifying, and identifying special nuclear materials
The detection of illicit nuclear materials is a major tool in preventing and deterring nuclear
terrorism. The detection task is extremely difficult because of physical limitations of nuclear …
terrorism. The detection task is extremely difficult because of physical limitations of nuclear …
Discrete Wavelet Transform and One-Class Support Vector Machines for anomaly detection in wireless sensor networks
S Takianngam, W Usaha - 2011 international symposium on …, 2011 - ieeexplore.ieee.org
Data readings from wireless sensor networks (WSNs) may be abnormal due to detection of
unusual phenomena, limited battery power, sensor malfunction, or noise from the …
unusual phenomena, limited battery power, sensor malfunction, or noise from the …
Anomaly Detection Using Machine Learning Techniques: A Systematic Review
Anomaly detection is an observation of irregular, uncommon events that leads to a deviation
from the expected behaviour of a larger dataset. When data is multiplied exponentially, it …
from the expected behaviour of a larger dataset. When data is multiplied exponentially, it …
[BOK][B] Automated network anomaly detection with learning, control and mitigation
D Ippoliti - 2014 - search.proquest.com
Anomaly detection is a challenging problem that has been researched within a variety of
application domains. In network intrusion detection, anomaly based techniques are …
application domains. In network intrusion detection, anomaly based techniques are …
[PDF][PDF] Classification of KDDCup99 Dataset for Intrusion Detection: A Survey
S Tiwari, A Dubey - scholar.archive.org
Detection of intrusion in network is necessary since the intrusion may create harm or attack
any application which needs to be detected and prevented. Although there are various …
any application which needs to be detected and prevented. Although there are various …