咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 9 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 12 篇 graph-based anom...
  • 3 篇 anomaly detectio...
  • 3 篇 data mining
  • 2 篇 graph reduction
  • 2 篇 thermal flow pro...
  • 2 篇 hybrid fdi
  • 2 篇 knowledge discov...
  • 2 篇 feature extracti...
  • 2 篇 graph matching
  • 2 篇 industrial proce...
  • 1 篇 internet of thin...
  • 1 篇 random walk
  • 1 篇 centrality
  • 1 篇 intrusion detect...
  • 1 篇 clustering
  • 1 篇 isolation
  • 1 篇 dynamic networks
  • 1 篇 social network a...
  • 1 篇 proximity
  • 1 篇 systematic liter...

机构

  • 2 篇 tennessee techno...
  • 2 篇 washington state...
  • 1 篇 univ huddersfiel...
  • 1 篇 hong kong polyte...
  • 1 篇 hasso plattner i...
  • 1 篇 north west univ ...
  • 1 篇 univ diego porta...
  • 1 篇 univ las amer es...
  • 1 篇 tennessee techno...
  • 1 篇 rmit univ sch ac...
  • 1 篇 inst proc techno...
  • 1 篇 la trobe univ ct...
  • 1 篇 pla strateg supp...
  • 1 篇 school of electr...
  • 1 篇 panjab univ uiet...
  • 1 篇 institute for pr...
  • 1 篇 new york univ ab...
  • 1 篇 univ warsaw inst...
  • 1 篇 north west univ ...
  • 1 篇 univ las amer es...

作者

  • 3 篇 holder lawrence
  • 3 篇 eberle william
  • 1 篇 smith jan h.
  • 1 篇 najafi pejman
  • 1 篇 zhou kai
  • 1 篇 van schoor georg...
  • 1 篇 wang kai
  • 1 篇 govea jaime
  • 1 篇 villegas-ch will...
  • 1 篇 koehler daniel
  • 1 篇 jan h. smith
  • 1 篇 wu jingwen
  • 1 篇 rahwan talal
  • 1 篇 shi haoran
  • 1 篇 liu shuxin
  • 1 篇 meinel christoph
  • 1 篇 thomas schäfer
  • 1 篇 pourhabibi taher...
  • 1 篇 michalak tomasz ...
  • 1 篇 ong kok-leong

语言

  • 12 篇 英文
检索条件"主题词=Graph-based anomaly detection"
12 条 记 录,以下是1-10 订阅
排序:
Fraud detection: A systematic literature review of graph-based anomaly detection approaches
收藏 引用
DECISION SUPPORT SYSTEMS 2020年 133卷 113303-113303页
作者: Pourhabibi, Tahereh Ong, Kok-Leong Kam, Booi H. Boo, Yee Ling RMIT Univ Sch Accounting Informat Syst & Supply Chain Melbourne Vic Australia La Trobe Univ Ctr Data Analyt & Cognit Melbourne Vic Australia
graph-based anomaly detection (GBAD) approaches are among the most popular techniques used to analyze connectivity patterns in communication networks and identify suspicious behaviors. Given the different GBAD approac... 详细信息
来源: 评论
Intrusion detection in IoT Networks Using Dynamic graph Modeling and graph-based Neural Networks
收藏 引用
IEEE ACCESS 2025年 13卷 65356-65375页
作者: Villegas-Ch, William Govea, Jaime Navarro, Alexandra Maldonado Jativa, Pablo Palacios Univ Las Amer Escuela Ingn Cibersegur FICA Quito 170125 Ecuador Univ Las Amer Escuela Postgrad Derecho Quito 170125 Ecuador Univ Diego Portales Escuela Informat & Telecomunicac Santiago 8370191 Chile
The rapid expansion of Internet of Things (IoT) networks has significantly increased security vulnerabilities, exposing critical infrastructures to sophisticated cyberattacks. Traditional Intrusion detection Systems, ... 详细信息
来源: 评论
Coupled-Space Attacks Against Random-Walk-based anomaly detection
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 9315-9329页
作者: Lai, Yuni Waniek, Marcin Li, Liying Wu, Jingwen Zhu, Yulin Michalak, Tomasz P. Rahwan, Talal Zhou, Kai Hong Kong Polytech Univ Dept Comp Hong Kong Peoples R China Univ Warsaw Inst Informat PL-02093 Warsaw Poland New York Univ Abu Dhabi Dept Comp Sci Abu Dhabi U Arab Emirates
Random Walks-based anomaly detection (RWAD) is commonly used to identify anomalous patterns in various applications. An intriguing characteristic of RWAD is that the input graph can either be pre-existing graphs or fe... 详细信息
来源: 评论
anomaly detection in data represented as graphs
收藏 引用
INTELLIGENT DATA ANALYSIS 2007年 第6期11卷 663-689页
作者: Eberle, William Holder, Lawrence Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Washington State Univ Sch Elect Engn & Comp Sci Pullman WA 99164 USA
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a graph. In this paper we present graph-... 详细信息
来源: 评论
A review of social network centric anomaly detection techniques
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS 2016年 第4期17卷 358-386页
作者: Kaur, Ravneet Singh, Sarbjeet Panjab Univ UIET Dept Comp Sci & Engn Chandigarh 160014 India
Online social networks have gained much attention in the recent years in terms of their analysis for usage as well as detection of abnormal activities. Anomalous activities arise when someone shows a different behavio... 详细信息
来源: 评论
graph Filtering to Remove the "Middle Ground" for anomaly detection  8
Graph Filtering to Remove the "Middle Ground" for Anomaly De...
收藏 引用
8th IEEE International Conference on Big Data (Big Data)
作者: Eberle, William Holder, Lawrence Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Washington State Univ Sch Elect Engn & Comp Sci Pullman WA 99164 USA
Discovering patterns and anomalies in a variety of voluminous data represented as a graph is challenging. Current research has demonstrated success discovering graph patterns using a sampling of the data, but there ha... 详细信息
来源: 评论
Collusive anomalies detection based on collaborative markov random field
收藏 引用
INTELLIGENT DATA ANALYSIS 2022年 第6期26卷 1469-1485页
作者: Shi, Haoran Ji, Lixin Liu, Shuxin Wang, Kai Hu, Xinxin PLA Strateg Support Force Informat Engn Univ Inst Informat Technol Zhengzhou 450000 Henan Peoples R China
Abnormal collusive behavior, widely existing in various fields with concealment and synergy, is particularly harmful in user-generated online reviews and hard to detect by traditional methods. With the development of ... 详细信息
来源: 评论
NLP-based Entity Behavior Analytics for Malware detection
NLP-based Entity Behavior Analytics for Malware Detection
收藏 引用
40th IEEE International Performance, Computing, and Communications Conference (IPCCC)
作者: Najafi, Pejman Koehler, Daniel Cheng, Feng Meinel, Christoph Hasso Plattner Inst Potsdam Germany
In this research, we formulate malware detection as a large-scale data-mining problem within Security Information and Event Management (SIEM) systems. We hypothesize that behavioral analysis of executable/process acti... 详细信息
来源: 评论
Detecting Suspicious Behavior Using a graph-based Approach
Detecting Suspicious Behavior Using a Graph-Based Approach
收藏 引用
IEEE Conference Visual Analytics Sci Technology
作者: Mookiah, Lenin Eberle, William Holder, Lawrence Tennessee Technol Univ Cookeville TN 38505 USA Washington State Univ Pullman WA 99164 USA
The ability to discover illicit behaviour in complex, heterogeneous data is a daunting problem. In the VAST 2014 competition, one of the challenges involves identifying for local law enforcement which employees are in... 详细信息
来源: 评论
Security Auditing in the Fog  17
Security Auditing in the Fog
收藏 引用
2nd International Conference on Internet of things, Data and Cloud Computing (ICC)
作者: Parkinson, Simon Qin, Yongrui Khan, Saad Vallati, Mauro Univ Huddersfield Dept Informat Huddersfield HD1 3DH W Yorkshire England
Technology specific expert knowledge is often required to analyse security configurations and determine potential vulnerabilities, but it becomes difficult when it is a new technology such as Fog computing. Furthermor... 详细信息
来源: 评论