S Ranshous, S Shen, D Koutra… - Wiley …, 2015 - Wiley Online Library
Anomaly detection is an important problem with multiple applications, and thus has been studied for decades in various research domains. In the past decade there has been a …
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as security, finance, health care, and law enforcement. While numerous techniques …
BB Gupta, A Gaurav, EC Marín… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Intelligent Transport Systems (ITS) is a developing technology that will significantly alter the driving experience. In such systems, smart vehicles and Road-Side Units (RSUs) …
H Fan, F Zhang, Z Li - ICASSP 2020-2020 IEEE International …, 2020 - ieeexplore.ieee.org
Anomaly detection on attributed networks aims at finding nodes whose patterns deviate significantly from the majority of reference nodes, which is pervasive in many applications …
R Foorthuis - International journal of data science and analytics, 2021 - Springer
Anomalies are occurrences in a dataset that are in some way unusual and do not fit the general patterns. The concept of the anomaly is typically ill defined and perceived as vague …
K Ding, J Li, H Liu - Proceedings of the twelfth ACM international …, 2019 - dl.acm.org
Performing anomaly detection on attributed networks concerns with finding nodes whose patterns or behaviors deviate significantly from the majority of reference nodes. Its success …
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced …
Detecting botnets in a network is crucial because bots impact numerous areas such as cyber security, finance, health care, law enforcement, and more. Botnets are becoming more …