咨询与建议

限定检索结果

文献类型

  • 23 篇 会议
  • 22 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44 篇 工学
    • 29 篇 计算机科学与技术...
    • 14 篇 电气工程
    • 8 篇 信息与通信工程
    • 5 篇 机械工程
    • 5 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 3 篇 核科学与技术
    • 3 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 轻工技术与工程
  • 4 篇 理学
    • 2 篇 化学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 48 篇 anomaly detectio...
  • 13 篇 machine learning
  • 5 篇 intrusion detect...
  • 5 篇 cybersecurity
  • 4 篇 internet of thin...
  • 3 篇 cyber security
  • 3 篇 deep learning
  • 3 篇 ads-b
  • 3 篇 anomaly detectio...
  • 3 篇 gradient boostin...
  • 3 篇 bwr type reactor...
  • 3 篇 avionics securit...
  • 3 篇 feature extracti...
  • 3 篇 water chemistry
  • 3 篇 ids
  • 2 篇 intrusion detect...
  • 2 篇 random forest
  • 2 篇 hidden markov mo...
  • 2 篇 fault detection ...
  • 2 篇 support vector m...

机构

  • 2 篇 univ chinese aca...
  • 2 篇 istinye univ dep...
  • 2 篇 ontario tech uni...
  • 2 篇 univ tartu inst ...
  • 2 篇 hitachi ltd hita...
  • 2 篇 robert gordon un...
  • 1 篇 rajarambapu inst...
  • 1 篇 nitttr dept comp...
  • 1 篇 school of engine...
  • 1 篇 univ tartu inst ...
  • 1 篇 graduate school ...
  • 1 篇 univ manitoba de...
  • 1 篇 natl inst techno...
  • 1 篇 abv indian inst ...
  • 1 篇 chinese acad sci...
  • 1 篇 institute of com...
  • 1 篇 univ med pharm s...
  • 1 篇 univ tekn malays...
  • 1 篇 chinese acad sci...
  • 1 篇 csir za-0184 pre...

作者

  • 3 篇 ahmad zeeshan
  • 3 篇 uchida s
  • 3 篇 asakura y
  • 3 篇 ullah imtiaz
  • 3 篇 mahmoud qusay h.
  • 3 篇 akleylek sedat
  • 3 篇 cevik nursah
  • 3 篇 petrovski andrei
  • 2 篇 ohsumi k
  • 2 篇 shah syed aziz
  • 2 篇 nagase m
  • 1 篇 alowidi nahed
  • 1 篇 wolfe shawn r.
  • 1 篇 ehsan alvena
  • 1 篇 song chen
  • 1 篇 wang liming
  • 1 篇 wang yutong
  • 1 篇 alshammry nizal ...
  • 1 篇 kahovec brian
  • 1 篇 ikenaga takeshi

语言

  • 43 篇 英文
  • 5 篇 其他
检索条件"主题词=Anomaly Detection System"
48 条 记 录,以下是41-50 订阅
排序:
Ensemble Classifier Design and Performance Evaluation forIntrusion detection Using UNSW-NB15 Dataset
Ensemble Classifier Design and Performance Evaluation forInt...
收藏 引用
作者: Zoghi, Zeinab University of Toledo
学位级别:硕士
In this study, an Intrusion detection system (IDS) is designed based on Machine Learning classifiers and its performance is evaluated for the set of attacks entailed in the UNSW-NB15 dataset. This dataset is comprised... 详细信息
来源: 评论
Mutual Information Based Ensemble anomaly detection Strategy for Cyber-Physical systems  8th
Mutual Information Based Ensemble Anomaly Detection Strategy...
收藏 引用
8th International Scientific Conference on Intelligent Information Technologies for Industry, IITI 2024
作者: Ahmad, Zeeshan Petrovski, Andrei Kotenko, Igor Shah, Syed Aziz Li, Yin School of Engineering Computing and Mathematical Sciences University of Wolverhampton Wolverhampton United Kingdom Samara State Technical University Samara Russia St. Petersburg Federal Research Center of the Russian Academy of Sciences St. Petersburg Russia Research Centre for Intelligent Healthcare Coventry University Coventry United Kingdom Harbin Institute of Technology Harbin China
Cyber-Physical systems (CPS) transformed industry 4.0 by integrating the cyber world with the physical processes for smooth industrial operations. However, this integration of interconnected industrial devices with di... 详细信息
来源: 评论
Detekce síťových anomálií
Detekce síťových anomálií
收藏 引用
作者: Pšorn, Daniel Brno University of Technology
Tato diplomová práce se zabývá metodami detekce anomálií v sítovém provozu. Nejdříve práce rozebírá základní pojmy z oblasti detekce anomáli&#... 详细信息
来源: 评论
Enhanced anomaly detection in Ethereum: Unveiling and Classifying Threats With Machine Learning
收藏 引用
IEEE ACCESS 2024年 12卷 176440-176456页
作者: Ehsan, Alvena Iqbal, Zahid Abuowaida, Suhaila Aljaidi, Mohammad Zia, Hafiz Usman Alshdaifat, Nawaf Alshammry, Nizal Khalf Univ Gujrat Fac Comp & IT Dept Informat Technol Gujrat 50700 Pakistan Univ Gujrat Fac Comp & IT Dept Comp Sci Gujrat 50700 Pakistan Al Al Bayt Univ Fac Prince Al Hussein Bin Abdallah II IT Dept Comp Sci Mafraq 25113 Jordan Zarqa Univ Fac Informat Technol Dept Comp Sci Zarqa 13110 Jordan Appl Sci Private Univ Fac Informat Technol Amman 11937 Jordan Northern Border Univ Fac Comp & Informat Technol Dept Comp Sci Ar Ar 91431 Saudi Arabia
Blockchain has emerged as a groundbreaking security technology, playing a vital role in various industries such as banking, the Internet of Things (IoT), healthcare, education, and voting. However, the widespread adop... 详细信息
来源: 评论
IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
收藏 引用
COMPUTERS & SECURITY 2024年 146卷
作者: Kalaria, Rudri Kayes, A. S. M. Rahayu, Wenny Pardede, Eric Salehi, S. Ahmad La Trobe Univ Bundoora Vic 3086 Australia
Securing Internet of Things (IoT) devices is paramount to mitigate unauthorised access and potential cyber threats, safeguarding the integrity of transmitted and processed data within interconnected devices. Identifyi... 详细信息
来源: 评论
Automated One-Sided Learning Fault detection system for Reaction Wheel Bearing Friction Anomalies
收藏 引用
JOURNAL OF AEROSPACE INFORMATION systemS 2024年 第5期21卷 380-391页
作者: Huang, Yujia Ferguson, Philip Univ Manitoba Dept Mech Engn E1-451 75A Chancellors Circle Winnipeg MB R3T 2N2 Canada Univ Manitoba NSERC Magellan Aerosp Ind Res Chair Satell Engn Dept Mech Engn E1-546 76A Chancellors Circle Winnipeg MB R3T 2N2 Canada
Monitoring a satellite's health during a mission has become critical in space engineering. In-flight anomaly detection is difficult for ground operators, placing space missions at risk of failure. Machine learning... 详细信息
来源: 评论
Key Process Protection of High Dimensional Process Data in Complex Production
收藏 引用
CMC-COMPUTERS MATERIALS & CONTINUA 2019年 第2期60卷 645-658页
作者: Shi, He Shang, Wenli Chen, Chunyu Zhao, Jianming Yin, Long Univ Chinese Acad Sci Beijing Peoples R China Chinese Acad Sci Shenyang Inst Automat Shenyang Peoples R China Chinese Acad Sci Key Lab Networked Control Syst Shenyang Peoples R China Chinese Acad Sci Inst Robot & Intelligent Mfg Shenyang Peoples R China
In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame... 详细信息
来源: 评论
Methods of Testing of the Corporate Network's Traffic Anomalies
Methods of Testing of the Corporate Network's Traffic Anomal...
收藏 引用
2018 3rd International Conference on Communications, Information Management and Network Security(CIMNS2018)
作者: Nikita Kulyаsov Sergey Isaev Institute of Computational Modelling of the Siberian Branch of the Russian Academy of Sciences
This article gives an overview of the existing methods and software products designed to analyze anomalies that may indicate the occurrence of *** their basis,we propose our own original software tool that allows auto... 详细信息
来源: 评论