A mixed clustering approach for real-time anomaly detection

FA Mazarbhuiya, M Shenify - Applied Sciences, 2023 - mdpi.com
Anomaly detection in real-time data is accepted as a vital area of research. Clustering
techniques have effectively been applied for the detection of anomalies several times. As the …

[PDF][PDF] Detecting anomaly using neighborhood rough set based classification approach

FA Mazarbhuiya - ICIC Express Lett, 2023 - icicel.org
A vital field of research is network anomaly detection. Several research papers in this topic
have previously been published, using various methodologies or algorithms. The …

Real-Time Anomaly Detection with Subspace Periodic Clustering Approach

FA Mazarbhuiya, M Shenify - Applied Sciences, 2023 - mdpi.com
Finding real-time anomalies in any network system is recognized as one of the most
challenging studies in the field of information security. It has so many applications, such as …

An Intuitionistic Fuzzy-Rough Set-Based Classification for Anomaly Detection

FA Mazarbhuiya, M Shenify - Applied Sciences, 2023 - mdpi.com
The challenging issues of computer networks and databases are not only the intrusion
detection but also the reduction of false positives and increase of detection rate. In any …

Detecting IoT Anomaly Using Rough Set and Density Based Subspace Clustering

FA Mazarbhuiya - ICIC Express Letters, Forthcoming, 2022 - papers.ssrn.com
IoT technology has significantly contributed in the improvement of quality of life by facilitating
various real-life smart applications. IoT consists of large number of interconnecting digital …

Detecting IoT Anomalies Using Fuzzy Subspace Clustering Algorithms

M Shenify, FA Mazarbhuiya, AS Wungreiphi - Applied Sciences, 2024 - mdpi.com
There are many applications of anomaly detection in the Internet of Things domain. IoT
technology consists of a large number of interconnecting digital devices not only generating …

Mixed Data Type Analysis: A Systematic Literature Review

H Pratama, FF Lubis… - … journaL Information System, 2024 - jom.fti.budiluhur.ac.id
This research aims to determine the direction of research in the analysis of mixed data types.
The world is currently filled with increasingly diverse data, especially in terms of data types …

[PDF][PDF] PortMap DDoS Attack Detection Using Feature Rank and Machine Learning Algorithms

Y Sugianela, T Ahmad - ICIC Express Letters, Part B: Applications, 2022 - icicelb.org
The era of big data, which is coming with a complicated and big scope of data, has caused
the increase of the possibility of network attack. One of those possible attacks is DDoS or …

Detecting IoT Anomaly using Fuzzy Subspace Clustering Algorithm

FAA Mazarbhuiya, MA Shenify, AS Wungreiphi - 2023 - preprints.org
There are many applications of anomaly detection in IoT domain. IoT technology consists of
large number of interconnecting digital devices not only generating huge data continuously …

Finding IoT Anomaly using Rough Fuzzy Periodic Subspace Clustering Approach

FAA Mazarbhuiya, M Shenify - 2023 - preprints.org
Finding anomalies in the real-time system is recognized as one of most challenging study in
information security. It has so many applications like IoT, and Stock-Market. In any IoT …