Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

[HTML][HTML] Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives

Y Himeur, K Ghanem, A Alsalemi, F Bensaali, A Amira - Applied Energy, 2021 - Elsevier
Enormous amounts of data are being produced everyday by sub-meters and smart sensors
installed in residential buildings. If leveraged properly, that data could assist end-users …

[PDF][PDF] Machine learning based model to identify firewall decisions to improve cyber-defense

QA Al-Haijaa, A Ishtaiwia - International Journal on Advanced …, 2021 - academia.edu
A firewall system is a security system to ensure traffic control for incoming and outgoing
packets passing through communication networks by applying specific decisions to improve …

Application of sliding window deep learning for intrusion detection in fog computing

HOM Omar, SB Goyal… - 2021 Emerging Trends in …, 2021 - ieeexplore.ieee.org
Fog computing is an extended concept of cloud computing or edge computing. It was
introduced to reduces the overhead and existing issues of cloud such as latency, wastage of …

A multimode anomaly detection method based on oc-elm for aircraft engine system

S Chen, M Wu, P Wen, F Xu, S Wang, S Zhao - IEEE Access, 2021 - ieeexplore.ieee.org
The practical industrial processes possess the characteristics of multimode, unbalanced
data distribution, and complex types of abnormalities, which are challenging to the anomaly …

Securing data by detecting multi channel attacks using deep learning

AVA Mary, EVNS Prem… - 2021 5th International …, 2021 - ieeexplore.ieee.org
The Internet impacts extraordinarily upon each part of our lives, and thus is a basic asset for
everybody. Any disturbance or inaccessibility of this asset may prompt genuine effects at …