咨询与建议

限定检索结果

文献类型

  • 23 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44 篇 工学
    • 29 篇 计算机科学与技术...
    • 14 篇 电气工程
    • 8 篇 信息与通信工程
    • 5 篇 机械工程
    • 5 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 3 篇 核科学与技术
    • 3 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 轻工技术与工程
  • 4 篇 理学
    • 2 篇 化学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 48 篇 anomaly detectio...
  • 13 篇 machine learning
  • 5 篇 intrusion detect...
  • 5 篇 cybersecurity
  • 4 篇 internet of thin...
  • 3 篇 cyber security
  • 3 篇 deep learning
  • 3 篇 ads-b
  • 3 篇 anomaly detectio...
  • 3 篇 gradient boostin...
  • 3 篇 bwr type reactor...
  • 3 篇 avionics securit...
  • 3 篇 feature extracti...
  • 3 篇 water chemistry
  • 3 篇 ids
  • 2 篇 intrusion detect...
  • 2 篇 random forest
  • 2 篇 hidden markov mo...
  • 2 篇 fault detection ...
  • 2 篇 support vector m...

机构

  • 2 篇 univ chinese aca...
  • 2 篇 istinye univ dep...
  • 2 篇 ontario tech uni...
  • 2 篇 univ tartu inst ...
  • 2 篇 hitachi ltd hita...
  • 2 篇 robert gordon un...
  • 1 篇 rajarambapu inst...
  • 1 篇 nitttr dept comp...
  • 1 篇 school of engine...
  • 1 篇 univ tartu inst ...
  • 1 篇 graduate school ...
  • 1 篇 univ manitoba de...
  • 1 篇 natl inst techno...
  • 1 篇 abv indian inst ...
  • 1 篇 chinese acad sci...
  • 1 篇 institute of com...
  • 1 篇 univ med pharm s...
  • 1 篇 univ tekn malays...
  • 1 篇 chinese acad sci...
  • 1 篇 csir za-0184 pre...

作者

  • 3 篇 ahmad zeeshan
  • 3 篇 uchida s
  • 3 篇 asakura y
  • 3 篇 ullah imtiaz
  • 3 篇 mahmoud qusay h.
  • 3 篇 akleylek sedat
  • 3 篇 cevik nursah
  • 3 篇 petrovski andrei
  • 2 篇 ohsumi k
  • 2 篇 shah syed aziz
  • 2 篇 nagase m
  • 1 篇 alowidi nahed
  • 1 篇 wolfe shawn r.
  • 1 篇 ehsan alvena
  • 1 篇 song chen
  • 1 篇 wang liming
  • 1 篇 wang yutong
  • 1 篇 alshammry nizal ...
  • 1 篇 kahovec brian
  • 1 篇 ikenaga takeshi

语言

  • 43 篇 英文
  • 5 篇 其他
检索条件"主题词=Anomaly Detection System"
48 条 记 录,以下是1-10 订阅
排序:
anomaly detection system for ADS-B data: Attack vectors and machine learning models
收藏 引用
INTERNET OF THINGS 2025年 29卷
作者: Cevik, Nursah Akleylek, Sedat HAVELSAN TR-06800 Ankara Turkiye Univ Tartu Inst Comp Sci EE-51009 Tartu Estonia Istinye Univ Dept Comp Engn TR-34010 Istanbul Turkiye
The topic of security challenges and solutions for Automatic Dependent Surveillance-Broadcast (ADS-B) systems is becoming more critical day-to-day because of the increasing air traffic volume. Since aircraft and groun... 详细信息
来源: 评论
anomaly detection system in Cloud Environment Using Fuzzy Clustering Based ANN
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2016年 第3期21卷 494-505页
作者: Pandeeswari, N. Kumar, Ganesh PSNA Coll Engn & Technol Dept Informat Technol Dindigul India
Cloud computing affords lot of resources and computing facilities through Internet. Cloud systems attract many users with its desirable features. In spite of them, Cloud systems may experience severe security issues. ... 详细信息
来源: 评论
STRUCTURAL MATERIAL anomaly detection system USING WATER CHEMISTRY DATA .1. BASIC STRUCTURE OF anomaly detection system AND ITS APPLICATION FOR FUEL DEFECT detection
收藏 引用
JOURNAL OF NUCLEAR SCIENCE AND TECHNOLOGY 1986年 第3期23卷 233-243页
作者: UCHIDA, S ASAKURA, Y KITAMURA, M OHSUMI, K HITACHI LTD HITACHI WORKS HITACHI 317 JAPAN
A system to diagnose abnormalities on structural materials in the primary cooling systems of BWR by analyzing water chemistry data is proposed. In the system, patterns composed of more than two kinds of water chemistr... 详细信息
来源: 评论
SurveilNet: A Lightweight anomaly detection system for Cooperative IoT Surveillance Networks
收藏 引用
IEEE SENSORS JOURNAL 2021年 第22期21卷 25293-25306页
作者: Osifeko, Martins O. Hancke, Gerhard P. Abu-Mahfouz, Adnan M. Univ Pretoria Dept Elect Elect & Comp Engn ZA-0002 Pretoria South Africa Nanjing Univ Posts & Telecommun Coll Automat & Artificial Intelligence Nanjing 210049 Peoples R China CSIR ZA-0184 Pretoria South Africa
The boring and repetitive task of monitoring video feeds makes real-time anomaly detection tasks difficult for humans. Hence, crimes are usually detected hours or days after the occurrence. To mitigate this, the resea... 详细信息
来源: 评论
STRUCTURAL MATERIAL anomaly detection system USING WATER CHEMISTRY DATA .2. PREDICTION MODEL OF DOSE-RATE AROUND RECIRCULATION PIPES IN IRON CRUD SUPPRESSED BWR
收藏 引用
JOURNAL OF NUCLEAR SCIENCE AND TECHNOLOGY 1987年 第7期24卷 557-564页
作者: NAGASE, M ASAKURA, Y HUJIMORI, H SAKAGAMI, M UCHIDA, S Energy Research Laboratory Hitachi Ltd.
A calculation model was developed to predict the dose rate, caused by 58Co which is formed by the activation of 58Ni, around the recirculation pipes in boiling water reactors (BWRs). The model is characterized by cons... 详细信息
来源: 评论
STRUCTURAL MATERIAL anomaly detection system USING WATER CHEMISTRY DATA
收藏 引用
JOURNAL OF NUCLEAR SCIENCE AND TECHNOLOGY 1992年 第11期29卷 1120-1126页
作者: ASAKURA, Y NAGASE, M UCHIDA, S OHSUMI, K HITACHI LTD HITACHI WORKS HITACHI 317 JAPAN
The concept of an advanced water chemistry diagnosis system for detection of anomalies and preventive maintenance of system components is proposed and put into a concrete form. Using the analogy to a medical inspectio... 详细信息
来源: 评论
HEADS: Hybrid Ensemble anomaly detection system for Internet-of-Things Networks  25th
HEADS: Hybrid Ensemble Anomaly Detection System for Internet...
收藏 引用
25th International Conference on Engineering Applications of Neural Networks (EANN)
作者: Ahmad, Zeeshan Petrovski, Andrei Arifeen, Murshedul Khan, Adnan Shahid Shah, Syed Aziz Robert Gordon Univ Natl Subsea Ctr Aberdeen Scotland Univ Malaysia Sarawak Fac CS & IT Kota Samarahan Sarawak Malaysia Coventry Univ Res Ctr Intelligent Healthcare Coventry W Midlands England
The rapid expansion of Internet-of-Things (IoT) devices has revolutionized connectivity, facilitating the exchange of extensive data within IoT networks via the traditional internet. However, this innovation has also ... 详细信息
来源: 评论
Sequence-based Analysis of Static Probe Instrumentation Data For a VMM-based anomaly detection system  3
Sequence-based Analysis of Static Probe Instrumentation Data...
收藏 引用
3rd IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud) / 2nd IEEE International Conference of Scalable and Smart Cloud (IEEE SSC)
作者: Paundu, Ady Wahyudi Okuda, Takeshi Kadobayashi, Youki Yamaguchi, Suguru Nara Inst Sci & Technol Internet Engn Lab 8916-5 Takayama Ikoma Nara 6300192 Japan
In this work, we propose a framework for a Virtual Machine Monitor (VMM)-based anomaly detection system (ADS). This framework uses a sequence-based analysis Hidden Markov Model (HMM) on static probe instrumentation da... 详细信息
来源: 评论
Hybrid deep neural network anomaly detection system for SCADA networks: Réseaux neuronaux profonds hybrides de détection d'anomalies pour les systèmes SCADA
Hybrid deep neural network anomaly detection system for SCAD...
收藏 引用
作者: Kabore, Raogo Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire
学位级别:博士
Les systèmes SCADA sont de plus en plus ciblés par les cyberattaques en raison de nombreuses vulnérabilités dans le matériel, les logiciels, les protocoles et la pile de communication. Ces sys... 详细信息
来源: 评论
An anomaly detection system based on chi-square method with dynamic BIN algorithm
An anomaly detection system based on chi-square method with ...
收藏 引用
6th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA-2011
作者: Oshima, Shunsuke Ichimura, Yusuke Nakashima, Takuo Sueyoshi, Toshinori ICT Center for Learning Support Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Production Systems Engineering Course Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Dep. of Electronics and Intelligent Systems Engineering Tokai University 9-1-1 Toroku Kumamoto Japan Graduate School of Science and Technology Kumamoto University 2-39-1 Kurokami Kumamoto Japan
The statistic researches have been proposed to detect anomaly attacks using chi-square. In these researches, features such as the IP address and the port number are used as the probabilistic variables. The method base... 详细信息
来源: 评论