Interaction-focused anomaly detection on bipartite node-and-edge-attributed graphs

R Fathony, J Ng, J Chen - 2023 International Joint Conference …, 2023 - ieeexplore.ieee.org
Many anomaly detection applications naturally pro-duce datasets that can be represented
as bipartite graphs (user-interaction-item graphs). These graph datasets are usually sup …

Modeling and generating synthetic anomalies for energy and power time series

M Turowski, M Weber, O Neumann, B Heidrich… - Proceedings of the …, 2022 - dl.acm.org
With the development of the smart grid, the number of recorded energy and power times
series increases noticeably. This increase allows for the automation of smart grid …

A membership function for intrusion and anomaly detection of low frequency attacks

A Nagaraja, VS Kiran, N Rajasekhar - … on Data Science, E-learning and …, 2018 - dl.acm.org
The ultimate objective of intrusion detection problem is to identify surprising intrusions that
compromise networks. Determining intrusions through the application of classifiers or …

Machine learning techniques for web intrusion detection—a comparison

TS Pham, TH Hoang… - 2016 Eighth International …, 2016 - ieeexplore.ieee.org
The rapid development of web applications has created many security problems related to
intrusions not just on computer, network systems, but also on web applications themselves …

Attack rules: an adversarial approach to generate attacks for Industrial Control Systems using machine learning

MA Umer, CM Ahmed, MT Jilani… - Proceedings of the 2th …, 2021 - dl.acm.org
Adversarial learning is used to test the robustness of machine learning algorithms under
attack and create attacks that deceive the anomaly detection methods in Industrial Control …

Generating artificial outliers in the absence of genuine ones—A survey

G Steinbuss, K Böhm - ACM Transactions on Knowledge Discovery from …, 2021 - dl.acm.org
By definition, outliers are rarely observed in reality, making them difficult to detect or analyze.
Artificial outliers approximate such genuine outliers and can, for instance, help with the …

An economic feasibility assessment framework for underutilised crops using Support Vector Machine

MS Oh, ZY Chen, E Jahanshiri, D Isa… - Computers and electronics …, 2020 - Elsevier
As susceptibility of commercial crops to the changing climates and resulting harsher
conditions increases, interest in the potential of resilient underutilised crops grows …

Black-Box Adversarial Attacks Against SQL Injection Detection Model

M Alqhtani, D Alghazzawi, S Alarifi - Contemporary Mathematics, 2024 - ojs.wiserpub.com
Abstract Structured Query Language (SQL) injection attacks represent a substantial threat to
the security of web applications, making the development of effective detection techniques …

A Framework for Synthetic Agetech Attack Data Generation

N Khaemba, I Traoré, M Mamun - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
To address the lack of datasets for agetech, this paper presents an approach for generating
synthetic datasets that include traces of benign and attack datasets for agetech. The …

Simultaneously Detecting Node and Edge Level Anomalies on Heterogeneous Attributed Graphs

R Fathony, J Ng, J Chen - 2024 International Joint Conference …, 2024 - ieeexplore.ieee.org
In complex systems like social media and financial transactions, diverse entities (users,
groups, products) interact through a multitude of relationships (friendships, comments …