[HTML][HTML] IoT anomaly detection methods and applications: A survey

A Chatterjee, BS Ahmed - Internet of Things, 2022 - Elsevier
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly
expanding field. This growth necessitates an examination of application trends and current …

LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge

Z Wang, J Tian, H Fang, L Chen, J Qin - Computer Networks, 2022 - Elsevier
Log anomaly detection on edge devices is the key to enhance edge security when
deploying IoT systems. Despite the success of many newly proposed deep learning based …

LogUAD: Log unsupervised anomaly detection based on Word2Vec

J Wang, C Zhao, S He, Y Gu, O Alfarraj… - Computer Systems …, 2022 - zuscholars.zu.ac.ae
Abstract System logs record detailed information about system operation and are important
for analyzing the system's operational status and performance. Rapid and accurate …

Distributed secure storage scheme based on sharding blockchain

J Wang, H Chenchen, Y Xiaofeng… - Computers …, 2022 - centaur.reading.ac.uk
Distributed storage can store data in multiple devices or servers to improve data security.
However, in today's explosive growth of network data, traditional distributed storage scheme …

Anomaly detection in log files using selected natural language processing methods

P Ryciak, K Wasielewska, A Janicki - Applied Sciences, 2022 - mdpi.com
In this article, we address the problem of detecting anomalies in system log files. Computer
systems generate huge numbers of events, which are noted in event log files. While most of …

Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics

YD Lin, ZY Wang, PC Lin, VL Nguyen… - Journal of Information …, 2022 - Elsevier
This work compares the performance of different combinations of data sources for intrusion
detection in depth. To learn and distinguish between normal and malicious behavior, we use …

Texture classification-based feature processing for violence-based anomaly detection in crowded environments

AA Mohamed, F Alqahtani, A Shalaby… - Image and vision …, 2022 - Elsevier
Anomaly detection from video surveillance inputs helps to improve security in crowded
places and outdoors. The captured image is analyzed to identify human faces, objects, and …

Explainable log parsing and online interval granular classification from streams of words

L Decker, D Leite, D Bonacorsi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We introduce a method called evolving Log Parsing (eLP) to extract information granules
and an interval rule-based classification model from streams of words in unstructured log …

Unsupervised contextual anomaly detection for database systems

S Li, Q Yin, G Li, Q Li, Z Liu, J Zhu - Proceedings of the 2022 …, 2022 - dl.acm.org
Abnormal data access operations in database systems always hap-pen, which are typically
incurred by misoperations or attacks, though these systems are enforced with strict access …

A soft sensor for bleeding detection in colonoscopies

A Gerald, M McCandless, A Sheth… - Advanced Intelligent …, 2022 - Wiley Online Library
Colonoscopies allow surgeons to detect common diseases, that is, colorectal cancer, ulcers,
and other ailments. However, there is a risk of bleeding in the lower gastrointestinal (GI) tract …