W Lim, KYS Chek, LB Theng, CTC Lin - Computers & Security, 2024 - Elsevier
Anomaly detection is crucial in various applications, particularly cybersecurity and network intrusion. However, a common challenge across anomaly detection techniques is the …
Abstract Space anomaly detection plays a critical role in safeguarding the integrity and reliability of space systems amid the rising tide of threats. This survey aims to deepen …
A Vaidya, S Sharma - Interactive Technology and Smart Education, 2024 - emerald.com
Purpose Course evaluations are formative and are used to evaluate learnings of the students for a course. Anomalies in the evaluation process can lead to a faulty educational …
H Bakır, Ö Ceviz - Arabian Journal for Science and Engineering, 2024 - Springer
Abstract Machine learning-based IDSs have demonstrated promising outcomes in identifying and mitigating security threats within IoT networks. However, the efficacy of such …
Industry 4.0 is moving towards deployment using 5G as one of the main underlying communication infrastructures. Thus, the vision of the Industry of the future is getting more …
C Surianarayanan, S Kunasekaran… - International Journal of …, 2024 - Springer
Detection of anomaly in streaming data requires continuous analysis of the stream in real time. This process turns out to be difficult due to varied volume and velocity of data streams …
Over the last few years, substantial research has been conducted towards developing efficient abnormal detection techniques while considering efficiency, accuracy, high …
D Mhlanga - Frontiers in big Data, 2024 - frontiersin.org
In the rapidly evolving landscape of financial technology (FinTech), big data stands as a cornerstone, driving significant transformations. This study delves into the pivotal role of big …