Peramalan Jumlah Penumpang Pesawat Di Bandara Internasional Ahmad Yani Dengan Metode Holt Winter's Exponential Smoothing Dan Metode Exponential …

S Sofiana, S Suparti, AR Hakim, I Triutami - Jurnal Gaussian, 2020 - ejournal3.undip.ac.id
Forecasting the number of airplane passengers can be a consideration for the airline at
Ahmad Yani International Airport related with addition of extra flight. The number of airplane …

Usage of modern exponential-smoothing models in network traffic modelling

R Jašek, A Szmit, M Szmit - … 2013: Prediction, Modeling and Analysis of …, 2013 - Springer
The article summarized current state of our works regarding usage of exponential smoothing
Holt-Winters' based models for analysis, modelling and forecasting Time Series with data of …

Anomaly subgraph detection with feature transfer

Y Sun, W Wang, N Wu, W Yu, X Chen - Proceedings of the 29th ACM …, 2020 - dl.acm.org
Anomaly detection in multilayer graphs becomes more critical in many application
scenarios, ie, identifying crime hotspots in urban areas by discovering suspicious and illicit …

Prediction of telecommunication network outage time using multilayer perceptron modelling approach

FK Oduro-Gyimah, KO Boateng, PB Adu… - 2021 International …, 2021 - ieeexplore.ieee.org
As the demand in communication traffic grows; there should be the provision of reliable
telecommunication network to users. Operators however, face a myriad of challenges in …

Fadman: Federated anomaly detection across multiple attributed networks

N Wu, N Zhang, W Wang, L Fan, Q Yang - arXiv preprint arXiv:2205.14196, 2022 - arxiv.org
Anomaly subgraph detection has been widely used in various applications, ranging from
cyber attack in computer networks to malicious activities in social networks. Despite an …

[PDF][PDF] Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator.

G Bernieri, F Pascucci, J López - ITASEC, 2017 - ceur-ws.org
In this paper, a highly-configurable network anomaly detection system for Critical
Infrastructure scenarios is presented. The Mininet virtual machine environment has been …

Network attacks detection using fuzzy logic

DK Levonevskiy, RR Fatkieva… - 2015 XVIII International …, 2015 - ieeexplore.ieee.org
The aim of research is to increase the network attack detection accuracy by means of fuzzy
logic. This paper considers an approach to intrusion detection using fuzzy logic. The …

Hiding data in SIP session

M Mehić, J Šlachta, M Voznak - 2015 38th International …, 2015 - ieeexplore.ieee.org
Steganography is method of hiding data inside of existing channels of communications. SIP
is one of the key protocols used to implement Voice over IP. It is used for establishing …

[HTML][HTML] Разработка системы обнаружения аномалий сетевого трафика

ДК Левоневский, РР Фаткиева - Системы анализа и обработки …, 2014 - cyberleninka.ru
Масштабное развитие сетевых сервисов ставит перед их администраторами задачу
обеспечить управляемость и подотчётность этих систем, их штатное …

Dynamic link anomaly analysis for network security management

T Zhang, Q Liao - Journal of Network and Systems Management, 2019 - Springer
Network management is challenging due to ever increasing complexity and dynamics of
network interactions. While many changes in networks are normal, some changes are not …