Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Denial of service attacks in wireless networks: The case of jammers

K Pelechrinis, M Iliofotou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The shared nature of the medium in wireless networks makes it easy for an adversary to
launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

Detecting DDoS attacks in cloud computing environment

AM Lonea, DE Popescu, H Tianfield - International Journal of …, 2013 - univagora.ro
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS)
attacks in cloud computing environments. This type of attacks is often the source of cloud …

[HTML][HTML] Abnormal event detection for video surveillance using an enhanced two-stream fusion method

Y Yang, Z Fu, SM Naqvi - Neurocomputing, 2023 - Elsevier
Abnormal event detection is a critical component of intelligent surveillance systems, focusing
on identifying abnormal objects or unusual human behaviours in video sequences …

[PDF][PDF] Anomaly detection

NR Prasad, S Almanza-Garcia… - Computers, Materials, & …, 2010 - cdn.techscience.cn
The paper presents a revolutionary framework for the modeling, detection, characterization,
identification, and machine-learning of anomalous behavior in observed phenomena arising …

Principal component reconstruction error for hyperspectral anomaly detection

JA Jablonski, TJ Bihl, KW Bauer - IEEE Geoscience and …, 2015 - ieeexplore.ieee.org
In this letter, a reliable, simple, and intuitive approach for hyperspectral imagery (HSI)
anomaly detection (AD) is presented. This method, namely, the global iterative principal …

[HTML][HTML] Anomaly detection using a self-organizing map and particle swarm optimization

ML Shahreza, D Moazzami, B Moshiri, MR Delavar - Scientia Iranica, 2011 - Elsevier
Abstract Self-Organizing Maps (SOMs) are among the most well-known, unsupervised
neural network approaches to clustering, which are very efficient in handling large and high …

Contribution à la surveillance des systèmes de production à l'aide des réseaux de neurones dynamiques: Application à la e-maintenance

R Zemouri - 2003 - theses.hal.science
Les méthodes de surveillance industrielle sont divisées en deux catégories: méthodes de
surveillance avec modèle formel de l'équipement, et méthodes de surveillance sans modèle …

Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection

AG Fragkiadakis, VA Siris… - Wireless …, 2015 - Wiley Online Library
We present intrusion detection algorithms to detect physical layer jamming attacks in
wireless networks. We compare the performance of local algorithms on the basis of the …