[HTML][HTML] IoT anomaly detection methods and applications: A survey

A Chatterjee, BS Ahmed - Internet of Things, 2022 - Elsevier
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly
expanding field. This growth necessitates an examination of application trends and current …

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

Logbert: Log anomaly detection via bert

H Guo, S Yuan, X Wu - 2021 international joint conference on …, 2021 - ieeexplore.ieee.org
Detecting anomalous events in online computer systems is crucial to protect the systems
from malicious attacks or malfunctions. System logs, which record detailed information of …

LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge

Z Wang, J Tian, H Fang, L Chen, J Qin - Computer Networks, 2022 - Elsevier
Log anomaly detection on edge devices is the key to enhance edge security when
deploying IoT systems. Despite the success of many newly proposed deep learning based …

[PDF][PDF] A storage optimization scheme for blockchain transaction databases.

J Zhang, S Zhong, J Wang, X Yu… - Comput. Syst. Sci …, 2021 - cdn.techscience.cn
As the typical peer-to-peer distributed networks, blockchain systems require each node to
copy a complete transaction database, so as to ensure new transactions can by verified …

[PDF][PDF] Small Object Detection via Precise Region-Based Fully Convolutional Networks.

D Zhang, F Li, X Ding, AK Sangaiah… - … , Materials & Continua, 2021 - cdn.techscience.cn
In the past several years, remarkable achievements have been made in the field of object
detection. Although performance is generally improving, the accuracy of small object …

LogUAD: Log unsupervised anomaly detection based on Word2Vec

J Wang, C Zhao, S He, Y Gu, O Alfarraj… - Computer Systems …, 2022 - zuscholars.zu.ac.ae
Abstract System logs record detailed information about system operation and are important
for analyzing the system's operational status and performance. Rapid and accurate …

Data-driven anomaly detection approach for time-series streaming data

M Zhang, J Guo, X Li, R Jin - Sensors, 2020 - mdpi.com
Recently, wireless sensor networks (WSNs) have been extensively deployed to monitor
environments. Sensor nodes are susceptible to fault generation due to hardware and …

Log sequence anomaly detection based on local information extraction and globally sparse transformer model

C Zhang, X Wang, H Zhang, H Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Anomaly detection for log sequences is a necessary task for system intelligent operation and
fault diagnosis. In a log sequence, adjacent logs have the property of local correlation, while …

Mannose metabolism inhibition sensitizes acute myeloid leukaemia cells to therapy by driving ferroptotic cell death

K Woodley, LS Dillingh, G Giotopoulos… - Nature …, 2023 - nature.com
Resistance to standard and novel therapies remains the main obstacle to cure in acute
myeloid leukaemia (AML) and is often driven by metabolic adaptations which are …