نتایج جستجو برای: dynamic anomaly detection

تعداد نتایج: 978818  

2009
Gabriela F. Cretu-Ciocarlie Angelos Stavrou Michael E. Locasto Salvatore J. Stolfo

The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the site and the type of traffic it receives, the operators might have to provide recent and sanitized training data sets, the characteristics of expected traffic (i.e. outlier ratio), and exceptions or even expected future...

2002
J. P. MILLER

A summary is given of the present status of the theory and experiment of the anomalous magnetic moment of the muon. A difference between predicted and measured values is an indication of physics beyond the Standard Model. A new experimental measurement has produced a value which differs from a recent Standard Model prediction by about 1.6 standard deviations. When first announced, the discrepan...

2012
Sami Alsouri Jan Sinschek Andreas Sewe Eric Bodden Mira Mezini Stefan Katzenbeisser

A hybrid cloud combines a trusted private cloud with a public cloud owned by an untrusted cloud provider. This is problematic: When a hybrid cloud shifts computation from its private to its public part, it must trust the public part to execute the computation as intended. We show how public-cloud providers can use dynamic anomaly detection to increase their clients’ trust in outsourced computat...

Journal: :Signal Processing 2004
Asok Ray

This paper presents a novel concept of anomaly detection in complex dynamical systems using tools of Symbolic Dynamics, Finite State Automata, and Pattern Recognition, where time-series data of the observed variables on the fast time-scale are analyzed at slow time-scale epochs for early detection of (possible) anomalies. The concept of anomaly detection in dynamical systems is elucidated based...

Journal: :CoRR 2016
Timothy La Fond Jennifer Neville Brian Gallagher

In this paper, we will focus on the task of anomaly detection in a dynamic network where the structure of the network is changing over time. For example, each time step could represent one day’s worth of activity on an e-mail network or communications of a computer network. The goal is then to identify any time steps where the pattern of those communications seems abnormal compared to those of ...

Journal: :EURASIP J. Information Security 2017
Lazaros K. Gallos Maciej Korczynski Nina H. Fefferman

Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detection are subject to inherent constraints: (1) they create a communication burden on the system, (2) they impose a delay in detection while information is being gathered, and (3) they requi...

1999
I. Goldman R. Mohapatra

We show, that SN1987A can serve as an astrophysical laboratory for testing the viability of the assertion that a new massive neutral fermion is implied by the KARMEN data. We show that a wide range of the parameters characterizing the proposed particle is ruled out by the above constraints making this interpretation very unlikely.

2005
Matthew V. Mahoney Philip K. Chan

We address the problem of online detection of unanticipated modes of mechanical failure given a small set of time series under normal conditions, with the requirement that the anomaly detection model be manually verifiable and modifiable. We specify a set of time series features, which are linear combinations of the current and past values, and model the allowed feature values by a sequence of ...

2015
Tommaso Zoppi

Revealing anomalies to support error detection in complex systems is a promising approach when traditional detection mechanisms (i.e., based on event logs, probes and heartbeats) are considered inadequate or not applicable: anomalies in data usually suggest significant, and also critical, actionable information in a wide variety of application domains. The detection capability of such complex s...

2011
R. DHANASEKARAN

Mobile ad hoc networks (MANETs) are relatively vulnerable to malicious network attacks, and therefore, security is a more significant issue than infrastructure-based wire-less networks. In MANETs, it is difficult to identify malicious hosts as the topology of the network dynamically changes. A malicious host can easily interrupt a route for which it is one of the forming nodes in the communicat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید