Data Streams Mining for Anomaly and Change Detection in Continuous Plant Operation
نویسندگان
چکیده
منابع مشابه
Data Mining for Anomaly Detection
Since its founding, NASA has been dedicated to the advancement of aeronautics and space science. The NASA scientific and technical information (STI) program plays a key part in helping NASA maintain this important role. The NASA STI program operates under the auspices of the Agency Chief Information Officer. It collects, organizes, provides for archiving, and disseminates NASA's STI. The NASA S...
متن کاملAnomaly Detection over Concept Drifting Data Streams
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incrementa...
متن کاملProbabilistic Models for Anomaly Detection in Remote Sensor Data Streams
Remote sensors are becoming the standard for observing and recording ecological data in the field. Such sensors can record data at fine temporal resolutions, and they can operate under extreme conditions prohibitive to human access. Unfortunately, sensor data streams exhibit many kinds of errors ranging from corrupt communications to partial or total sensor failures. This means that the raw dat...
متن کاملAnomaly Detection and SQL Prepare Data Sets for Data Mining
Anomaly detection has been an important research topic in data mining and machine learning. Many real-world applications such as intrusion or credit card fraud detection require an effective and efficient framework to identify deviated data instances. However, most anomaly detection methods are typically implemented in batch mode, and thus cannot be easily extended to large-scale problems witho...
متن کاملTemporal Data Streams for Anomaly Intrusion Detection (Extended Version)
Intrusion detection systems (IDS) aim to protect computer systems against attacks. The detection methods employed in anomalybased IDS are based, in particular, on monitoring networks for patterns of activity that differ from normal behaviour. Issues to be addressed with anomaly-based systems include deciding and representing what constitutes normal behaviour as well as being able to detect devi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC-PapersOnLine
سال: 2019
ISSN: 2405-8963
DOI: 10.1016/j.ifacol.2019.12.540