A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The need for simulation in evaluating anomaly detectors
2008
Computer communication review
In this paper we argue that there are numerous important questions regarding the effectiveness of anomaly detectors that cannot be answered by the evaluation techniques employed today. ...
What is quite surprising, however, is the lack of controlled evaluation of these detectors. ...
A simulation environment for this type of detector would need to account for packet dynamics. ...
doi:10.1145/1341431.1341443
fatcat:kes7uzfl4jbvtmffduvoivvjym
Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks
2017
International Journal of Communication Networks and Information Security
In this paper use of light-weighted R-Contiguous Bit matching for attack detection in WSNs has been evaluated. ...
The proposed model has been tested against some of the attacks. The high detection rate has proved the appropriateness of R-Contiguous bit matching mechanism for anomaly detection in WSNs. ...
They rely on the anomaly pattern which needs updating and this result in memory overhead for WSNs. ...
dblp:journals/ijcnis/ZeeshanJU17
fatcat:ea2zyjnb7rhapi4z3ryybcxcym
WebClass
2008
Computer communication review
In particular, it is important to evaluate detectors on traces from operational networks because it is in this setting that the detectors must ultimately succeed. ...
We argue that evaluating anomaly detectors on manually labeled traces is both important and unavoidable. ...
Shared Back-End Database WebClass is a system for evaluating anomaly detectors, not an anomaly detector. Running an anomaly detector is performed separately. ...
doi:10.1145/1341431.1341437
fatcat:x6wffz467jfcbijqc27ogb73ca
Sequential Feature Explanations for Anomaly Detection
[article]
2015
arXiv
pre-print
To address this issue, we study the problems of computing and evaluating sequential feature explanations (SFEs) for anomaly detectors. ...
To do this we construct anomaly detection benchmarks from real data sets along with artificial experts that can be simulated for evaluation. ...
In particular, the simulated analyst only needed to be shown a single feature on average in order to correctly detect the anomalies. ...
arXiv:1503.00038v1
fatcat:rw2qsv4vq5cbteieseqzxm6muy
Contextual Anomaly Detection in Big Sensor Data
2014
2014 IEEE International Congress on Big Data
The work proposed in this paper outlines a contextual anomaly detection technique for use in streaming sensor networks. ...
Further, most current techniques for anomaly detection only consider the content of the data source, i.e. the data itself, without concern for the context of the data. ...
Additionally, the authors would like to acknowledge the support provided by Powersmiths. ...
doi:10.1109/bigdata.congress.2014.19
dblp:conf/bigdata/HayesC14
fatcat:oi2wpfqorbgqtlwpviblinajki
An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks
2015
International Journal of Distributed Sensor Networks
An Anomaly Detection System (ADS) framework inspired from the Human Immune System is implemented in this paper for detecting Sybil attacks in WSNs. ...
The work has been tested in Omnet++ against Sybil attacks for WSNs. ...
Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. ...
doi:10.1155/2015/169654
fatcat:pkfqehjq6fgv3hqevsxpvhjiva
Ultrasonic measurement and monitoring of loads in bolts used in structural joints
2015
Structural Health Monitoring and Inspection of Advanced Materials, Aerospace, and Civil Infrastructure 2015
These applications were initially developed for measuring and monitoring preload in the NASA Space Shuttle Orbiter critical joints but are also applicable for monitoring loads in other critical bolted ...
These applications were initially developed for measuring and monitoring preload in the NASA Space Shuttle Orbiter critical joints. word The paper is an overview of work by the author in measuring and ...
Resolution of the detector used in these simulation runs uses the definition given in ASTM E 2737-10 standard practice for digital detector array performance evaluation and long-term stability. ...
doi:10.1117/12.2083220
fatcat:ljktpmbgenhttl3ap2yn5h24ty
Frequency-based anomaly detection for the automotive CAN bus
2015
2015 World Congress on Industrial Control Systems Security (WCICSS)
As part of a defence against these attacks, we evaluate an anomaly detector for the automotive controller area network (CAN) bus. ...
We also show how a similar measure of the data contents of packets is not effective for identifying anomalies. ...
As part of a defence against these attacks, we evaluate an anomaly detector for the automotive controller area network (CAN) bus. ...
doi:10.1109/wcicss.2015.7420322
dblp:conf/wcicss/TaylorJL15
fatcat:45dwtabzvndj3co3kpygzkvpri
Research on Self-Monitoring Method for Anomalies of Satellite Atomic Clock
2016
International Journal of Aerospace Engineering
So the monitoring for anomalies of the satellite atomic clock is very important. ...
In this paper, a complete autonomous monitoring method for the satellite clock is put forward, which is, respectively, based on Phase-Locked Loop (PLL) and statistical principle. ...
variance to evaluate clock stability in real time and the three-state Kalman filter for large drift-rate anomaly. ...
doi:10.1155/2016/1759512
fatcat:ftmlgqmaxfgllmtcxa4ag23lly
A Unified Remote Sensing Anomaly Detector Across Modalities and Scenes via Deviation Relationship Learning
[article]
2023
arXiv
pre-print
Furthermore, we design an instantiation of the reformulation in the data, architecture, and optimization aspects. Simulated spectral and spatial anomalies drive the instantiated architecture. ...
Given the diversity in earth anomaly types, a unified anomaly detector across modalities and scenes should be cost-effective and flexible to new earth observation sources and anomaly types. ...
For the simulation of both spectral anomalies and spatial anomalies, the spatial anomaly simulation can result in a more robust performance in most modalities, regardless of the l O simulation. ...
arXiv:2310.07511v1
fatcat:r6r3xzkdsned5gff3p3s44p5xu
Spectral anomaly methods for aerial detection using KUT nuisance rejection
2015
Nuclear Instruments and Methods in Physics Research Section A : Accelerators, Spectrometers, Detectors and Associated Equipment
The algorithm has been optimized for two 15 multi-detector systems; a NaI(Tl)-detector based system and a CsI detector array. ...
The work here details the adaptation and 12 optimization of the PNNL-developed algorithm NSCRAD (Nuisance-Rejecting Spectral 13 Comparison Ratios for Anomaly Detection), a spectral anomaly method previously ...
two flight locations 15 whether the NSCRAD settings need to be adjusted with altitud 16 Example of NSCRAD Energy windows for two sets of threat sources, with KUT The spectral anomaly method NSCRAD ...
doi:10.1016/j.nima.2015.01.040
fatcat:ywmkxt2h5bbrnknrdsqslnv7vq
Crowd-based detection of routing anomalies on the internet
2015
2015 IEEE Conference on Communications and Network Security (CNS)
In this paper we present and evaluate a user-centric crowd-based approach in which users passively monitor their network traffic, share information about potential anomalies, and apply combined collaborative ...
Our data-driven analysis using longitudinal and distributed RTT measurements also provides insights into detector selection and the relative weight that should be given to candidate detectors at different ...
Second, using a simple system model and tracedriven simulations, we evaluate the set of detector nodes that provides the best detection rates for a candidate victim (Section IV). ...
doi:10.1109/cns.2015.7346850
dblp:conf/cns/HiranCS15
fatcat:qyihgs2l35btfky62ufi2tmpra
Magnetic anomaly signal detection using parallel monostable stochastic resonance system
2020
IEEE Access
It can be expected to be widely used in the field of magnetic anomaly detection with PMSR system. ...
It provides an effective approach to detect the weak magnetic anomaly signal in low signal-to-noise ratio. ...
Finally, the simulation and experiment are conducted, in which we analyze the performance of PMSR detector in different magnetic anomaly signal waveforms.
II. ...
doi:10.1109/access.2020.3020881
fatcat:4pgg5geupbemxnptvh3yzf6jpq
Online data-driven anomaly detection in autonomous robots
2014
Knowledge and Information Systems
Not all faults can be known in advance, and hence, anomaly detection is required. In this paper, we present an online datadriven anomaly detection approach (ODDAD) for autonomous robots. ...
We empirically evaluate ODDAD in different domains: commercial unmanned aerial vehicles (UAVs), a vacuum-cleaning robot, a high-fidelity flight simulator and an electrical power system of a spacecraft. ...
Acknowledgments This research was funded in part by ISF Grant #1511/12 and by Kamin program. As always, thanks to K. Ushi and K. Ravit. ...
doi:10.1007/s10115-014-0754-y
fatcat:jnjwxbgwo5duxky2ni7y2lnazy
Recommendations For Core Monitoring To Enhance The Detection And Discrimination Of Anomalies By Neutron Noise Measurements
2022
Zenodo
These methods and tools allow the detection of anomalies in commercial nuclear reactor cores during operation by using the measurements of the fluctuations of the neutron flux – the so-called neutron noise ...
– by very few detectors. ...
ACKNOWLEDGEMENTS The CORTEX research project has received funding from the Euratom research and training programme 2014-2018 under grant agreement No 754316. ...
doi:10.5281/zenodo.6997380
fatcat:hd5u35fdpzfjljpy6pqumqacki
« Previous
Showing results 1 — 15 out of 25,060 results