Buscar
Mostrando ítems 21-30 de 1706
Algorithms for anomaly detection of traces in logs of process aware information systems
(Pergamon-elsevier Science LtdOxfordInglaterra, 2012)
Network anomaly detection with Net-GAN, a generative adversarial network for analysis of multivariate time-series.
(ACM, 2020)
We introduce Net-GAN, a novel approach to network anomaly detection in time-series, using recurrent neural networks (RNNs) and generative adversarial networks (GAN). Different from the state of the art, which traditionally ...
Molecular marker associated with a deleterious recessive anomaly in Eucalyptus grandis seedlings
(2015-12-01)
Key message: The identification of an anomaly with deleterious effect and Mendelian segregation (3 normal: 1 abnormal) allowed the detection of a marker linked to a locus for the anomalous phenotype. This marker could be ...
Analysis And Classification Of Methods For Network Attack Detection
(St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, 2016)
Detecção de intrusão através da análise de séries temporais e correlação do tráfego de rede
(Universidade Federal de Santa MariaBREngenharia de ProduçãoUFSMPrograma de Pós-Graduação em Engenharia de Produção, 2012-12-09)
This work presents a model to identify anomalies in the computer network behavior
applied to the problem of traffic management and security information. Due to the
feature of the traffic growth, some models do not differ ...
Manifold learning-based clustering approach applied to anomaly detection in surveillance videos
(2020-01-01)
The huge increase in the amount of multimedia data available and the pressing need for organizing them in different categories, especially in scenarios where there are no labels available, makes data clustering an essential ...
Manifold Learning-based Clustering Approach Applied to Anomaly Detection in Surveillance Videos
(Scitepress, 2020-01-01)
The huge increase in the amount of multimedia data available and the pressing need for organizing them in different categories, especially in scenarios where there are no labels available, makes data clustering an essential ...
Detecção de ataques de negação de serviço em redes de computadores através da transformada wavelet 2D
(Universidade Federal de Santa MariaBRCiência da ComputaçãoUFSMPrograma de Pós-Graduação em Informática, 2012-03-08)
The analysis of network traffic is a key area for the management of fault-tolerant systems,
since anomalies in network traffic can affect the availability and quality of service (QoS). Intrusion
detection systems in ...
Unsupervised non-technical losses identification through optimum-path forest
(Elsevier B.V., 2016-11-01)
Non-technical losses (NTL) identification has been paramount in the last years. However, it is not straightforward to obtain labelled datasets to perform a supervised NTL recognition task. In this paper, the optimum-path ...