R Jašek, A Szmit, M Szmit - … 2013: Prediction, Modeling and Analysis of …, 2013 - Springer
The article summarized current state of our works regarding usage of exponential smoothing Holt-Winters' based models for analysis, modelling and forecasting Time Series with data of …
Anomaly detection in multilayer graphs becomes more critical in many application scenarios, ie, identifying crime hotspots in urban areas by discovering suspicious and illicit …
As the demand in communication traffic grows; there should be the provision of reliable telecommunication network to users. Operators however, face a myriad of challenges in …
N Wu, N Zhang, W Wang, L Fan, Q Yang - arXiv preprint arXiv:2205.14196, 2022 - arxiv.org
Anomaly subgraph detection has been widely used in various applications, ranging from cyber attack in computer networks to malicious activities in social networks. Despite an …
In this paper, a highly-configurable network anomaly detection system for Critical Infrastructure scenarios is presented. The Mininet virtual machine environment has been …
DK Levonevskiy, RR Fatkieva… - 2015 XVIII International …, 2015 - ieeexplore.ieee.org
The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The …
M Mehić, J Šlachta, M Voznak - 2015 38th International …, 2015 - ieeexplore.ieee.org
Steganography is method of hiding data inside of existing channels of communications. SIP is one of the key protocols used to implement Voice over IP. It is used for establishing …
T Zhang, Q Liao - Journal of Network and Systems Management, 2019 - Springer
Network management is challenging due to ever increasing complexity and dynamics of network interactions. While many changes in networks are normal, some changes are not …