Detection of anomalous meetings in a social network

J Silva, R Willett - 2008 42nd Annual Conference on …, 2008 - ieeexplore.ieee.org
When monitoring interactions within a social network, meetings or contacts between different
members of the network are recorded. This paper addresses the problem of using the …

MLSEC-benchmarking shallow and deep machine learning models for network security

P Casas, G Marín, G Capdehourat… - 2019 IEEE Security …, 2019 - ieeexplore.ieee.org
Network security represents a keystone to ISPs, who need to cope with an increasing
number of network attacks that put the network's integrity at risk. The high-dimensionality of …

Adaptive algorithms for automated intruder detection in surveillance networks

T Ahmed, ASK Pathan, S Ahmed - … International Conference on …, 2014 - ieeexplore.ieee.org
Many types of automated visual surveillance systems have been presented in the recent
literature. Most of the schemes require custom equipment, or involve significant complexity …

Network traffic anomaly detection using adaptive density-based fuzzy clustering

D Liu, CH Lung, N Seddigh… - 2014 IEEE 13th …, 2014 - ieeexplore.ieee.org
Fuzzy C-means (FCM) clustering has been used to distinguish communication network
traffic outliers based on the uncommon statistical characteristics of network traffic data. The …

Distributed big data mining platform for smart grid

Z Wang, WU Bin, BAI Demeng… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
With the rapid development of information technology and internet, all kinds of industry data
exploded causing difficult to analyze and mine useful information from big data. Traditional …

User-profile-based analytics for detecting cloud security breaches

T Tiwari, A Turk, A Oprea, K Olcoz… - … Conference on Big …, 2017 - ieeexplore.ieee.org
While the growth of cloud-based technologies has benefited the society tremendously, it has
also increased the surface area for cyber attacks. Given that cloud services are prevalent …

Network anomaly detection using machine learning techniques

JJ Estévez-Pereira, D Fernández, FJ Novoa - Proceedings, 2020 - mdpi.com
While traditional network security methods have been proven useful until now, the flexibility
of machine learning techniques makes them a solid candidate in the current scene of our …

[PDF][PDF] Physics informed machine learning with misspecified priors:\\an analysis of turning operation in lathe machines

Z Zhao, X Ding, G Atulya, A Davis… - AAAI 2022 Workshop …, 2022 - adam-aaai2022.github.io
The recent development of physics informed neural networks (PINNs) has explored the
inclusion of prior physics knowledge into the objective function of deep learning models as …

Anomaly detection in thermal power plant using probabilistic neural network

A Hajdarevic, I Dzananovic… - … on Information and …, 2015 - ieeexplore.ieee.org
Anomalies are integral part of every system's behavior and sometimes cannot be avoided.
Therefore it is very important to timely detect such anomalies in real-world running power …

Neural network based unsupervised face and mask detection in surveillance networks

AR Ani, S Saheel, T Ahmed… - 2023 International …, 2023 - ieeexplore.ieee.org
In the post-pandemic world, surveillance cameras play a key aspect when it comes to
detecting various kinds of security risks. These can range from burglars entering a premises …