Robust pca for anomaly detection in cyber networks

R Paffenroth, K Kay, L Servi - arXiv preprint arXiv:1801.01571, 2018 - arxiv.org
This paper uses network packet capture data to demonstrate how Robust Principal
Component Analysis (RPCA) can be used in a new way to detect anomalies which serve as …

Space-time signal processing for distributed pattern detection in sensor networks

R Paffenroth, P Du Toit, R Nong… - IEEE Journal of …, 2013 - ieeexplore.ieee.org
A theory and algorithm for detecting and classifying weak, distributed patterns in network
data is presented. The patterns we consider are anomalous temporal correlations between …

Space-time signal processing for distributed pattern detection in sensor networks

RC Paffenroth, PC Du Toit, LL Scharf… - Signal and Data …, 2012 - spiedigitallibrary.org
We present a theory and algorithm for detecting and classifying weak, distributed patterns in
network data that provide actionable information with quantiable measures of uncertainty …

On covariance structure in noisy, big data

RC Paffenroth, R Nong… - Signal and Data …, 2013 - spiedigitallibrary.org
Herein we describe theory and algorithms for detecting covariance structures in large, noisy
data sets. Our work uses ideas from matrix completion and robust principal component …

[图书][B] Network representation matrices and their eigenproperties: A comparative study

J Lutzeyer - 2020 - core.ac.uk
Typically, network structures are represented by one of three different representation
matrices: the adjacency matrix, the unnormalised and the normalised graph Laplacian …

Reducing Reporting Burden of Healthcare Data Using Robust Principal Component Analysis

L Servi, R Paffenroth, M Jutras… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The US government imposes reporting requirements on healthcare providers as health
metrics are important for assessing and improving the US healthcare system. However …

Extraction, Characterization and Modeling of Network Data Features-A Compressive Sensing and Robust PCA based Approach

VW Bandara - 2015 - search.proquest.com
Designing computer networks resilient to failures, excessive loads, and attacks and then
monitoring them are challenged by a range of issues inherent to networks. These limitations …

[引用][C] GY1G21Y/GY

JO HNKNHNE