• Aucun résultat trouvé

[PDF] Top 20 Pattern-based Method for Anomaly Detection in Sensor Networks

Has 10000 "Pattern-based Method for Anomaly Detection in Sensor Networks" found on our website. Below are the top 20 most common "Pattern-based Method for Anomaly Detection in Sensor Networks".

Pattern-based Method for Anomaly Detection in Sensor Networks

Pattern-based Method for Anomaly Detection in Sensor Networks

... CONCLUSION Anomaly detection in supervisory applications is very important especially in the field of sensor ...approach based on patterns applied to the univariate time series ... Voir le document complet

11

Pattern-based Method for Anomaly Detection in Sensor Networks

Pattern-based Method for Anomaly Detection in Sensor Networks

... CONCLUSION Anomaly detection in supervisory applications is very important especially in the field of sensor ...approach based on patterns applied to the univariate time series ... Voir le document complet

12

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks

... problems in wireless sensor networks (WSNs). They are based on algebraic objects, such as ˇ Cech complex and Rips ...implement in practical ...each sensor. Closed form ... Voir le document complet

7

Annotation projection with pattern based neural networks for antonym and synonym detection in the Yorùbá Language

Annotation projection with pattern based neural networks for antonym and synonym detection in the Yorùbá Language

... existed. In thinking about what I could do in my current capacity to make contributions to my ancestral societies, I decided to address the issue of the decline of the languages, beginning with Yorùbá, the ... Voir le document complet

44

Probabilistic Anomaly Detection Method for Authorship Verification

Probabilistic Anomaly Detection Method for Authorship Verification

... Proposed Method In our method, we address the authorship verification problem as an anomaly detec- tion problem where texts written by a given author are seen as normal data, while texts not ... Voir le document complet

10

An Information Entropy Based Event Boundary Detection Algorithm in Wireless Sensor Networks

An Information Entropy Based Event Boundary Detection Algorithm in Wireless Sensor Networks

... boundary detection (DBD) algorithm for determining the event boundary is proposed in mobile ...mobile sensor node density less than ...all sensor nodes move in real time. ... Voir le document complet

18

A new management method for wireless sensor networks

A new management method for wireless sensor networks

... system in its process ...it. In LiveNCM, the agent must talk to the networks to obtain all the ...So, in case of communication unavailability, we choose to implement this module to store the ... Voir le document complet

9

Adaptive range-based anomaly detection in drone-assisted cellular networks

Adaptive range-based anomaly detection in drone-assisted cellular networks

... capacity for eHealth data to 20% out of the total capacity storage of the smartphone and we vary the percentage of eHealth users ...The anomaly is detected when the real-time network load is upper than the ... Voir le document complet

7

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... with sensor network design is the fact that sensor nodes operate with limited energy ...depleted. For some nodes, neither option is appropriate, that is, they will simply be discarded once their ... Voir le document complet

73

LSTM-based radiography for anomaly detection in softwarized infrastructures

LSTM-based radiography for anomaly detection in softwarized infrastructures

... platform for automating deployment, scaling, and operations of application containers across clus- ters of ...the pattern of multiple cooperating processes which form a cohesive unit of service through the ... Voir le document complet

10

Homology theory for coverage hole detection in wireless sensor networks

Homology theory for coverage hole detection in wireless sensor networks

... node detection (denoted by ...happen in this example). In order to find more boundary nodes, we aim to use the boundary nodes detected by the method ...repeated for the new added nodes ... Voir le document complet

186

Clustering-Based Anomaly Detection in Multi-View Data

Clustering-Based Anomaly Detection in Multi-View Data

... object in view 1 and view 2, are ...posed method on synthetic and benchmark ...datasets for our experiments: one 4D and two 2D synthetic datasets, namely ‘structures’, ‘circle’ and ‘spiral’ shown ... Voir le document complet

4

Interactive anomaly detection in mixed tabular data using Bayesian networks

Interactive anomaly detection in mixed tabular data using Bayesian networks

... improvements in processing abilities have quickly led to an increasing use of data analyses implying massive ...knowledge in a specific field can often allow the development of efficient models for ... Voir le document complet

13

Online and Scalable Unsupervised Network Anomaly Detection Method

Online and Scalable Unsupervised Network Anomaly Detection Method

... decisions. In [14], the authors propose an online and adaptive anomaly detection system based on a one-class ...located in this small region. Future input vectors are classified ... Voir le document complet

16

Anomaly-based network intrusion detection using machine learning

Anomaly-based network intrusion detection using machine learning

... IDS in a global network security plan, or the topology of the monitored ...probes. For a centralized solution, it is still possible to use the probes by having them preprocess the data they send to the ... Voir le document complet

123

Machine learning and extremes for anomaly detection

Machine learning and extremes for anomaly detection

... classical Anomaly Detection algorithms actions to be taken, especially in situations where human expertise is required to check each observation is ...perspective, anomaly detection can ... Voir le document complet

221

Model falsification diagnosis and sensor placement for leak detection in pressurized pipe networks

Model falsification diagnosis and sensor placement for leak detection in pressurized pipe networks

... compared in laboratory with other identification methods using reduced-scale benchmark pipe ...leaks in fluid-distribution pressur- ized pipe networks and it is able to support the design of ... Voir le document complet

17

Distance Measures for Anomaly Intrusion Detection

Distance Measures for Anomaly Intrusion Detection

... used for intrusion ...intrusion detection method by using the text categorization techniques based on the frequency attributes of system ...calls. In subsequence research, Hu et ... Voir le document complet

10

Multi-sensor based object detection in driving scenes

Multi-sensor based object detection in driving scenes

... approach in a moving camera context is not that ...their method could be built using a sliding window approach for initial detection and stereo obstacle segmentation when multiple targets ... Voir le document complet

33

A lightweight threat detection system for industrial wireless sensor networks

A lightweight threat detection system for industrial wireless sensor networks

... need for a threat detection system arises from the need to protect WSNs against ...a sensor node owning legitimate cryptographic keys can easily launch an internal attack inside the ...times ... Voir le document complet

13

Show all 10000 documents...