Ograniczanie wyników
Czasopisma help
Lata help
Autorzy help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Znaleziono wyników: 35
first rewind previous Strona / 2 next fast forward last
Wyszukiwano:
w słowach kluczowych:  anomaly detection
help Sortuj według:

help Ogranicz wyniki do:
1
100%
Journal of Theoretical and Applied Computer Science
EN Presented paper evaluates method for detecting software anomalies based on recurrence plot analysis of trace log generated by software execution. Described method for detecting software anomalies is based on windowed recurrence quantification analysis for selected measures (e.g. Recurrence rate - RR[...]
2
100%
Image Processing & Communications
EN In this paper we present further expansion of our matching pursuit methodology for anomaly detection in computer networks. In our previous work we proposed new signal based algorithm for intrusion detection systems based on anomaly detection approach on the basis of the Matching Pursuit algorithm. T[...]
3
100%
Measurement Automation Monitoring
2015 Vol. 61, No. 9 443--445
EN : In the paper, the authors present a method of anomalies detection and identification in network traffic using statistical signatures. There is also shown a new system architecture based on the Software-Defined Networking (SDN) which allows for application of statistical anomaly detection in compu[...]
4
100%
Image Processing & Communications
EN The article depicts possibility of using Matching Pursuit decomposition in order to recognize unspecified hazards in network traffic. Furthermore, the work aims to present feasible enhancements to the anomaly detection method, as well as their efficiency on the basis of a wide collection of pattern [...]
5
100%
Schedae Informaticae
2015 Vol. 24 63--71
EN In this article we present the use of sparse representation of a signal and incoherent dictionary learning method for the purpose of network traffic analysis. In learning process we use 1D INK-SVD algorithm to detect proper dictionary structure. Anomaly detection is realized by parameter estimation [...]
6
100%
Journal of Applied Computer Science Methods
EN In this paper we consider the problem of anomaly detection over time series metrics data took from one of corporate grade mail service cluster. We propose the algorithm based on one-sided median concept and present some results of experiments showing impact of parameters settings on algorithm perfor[...]
7
100%
Computer Science
2015 Vol. 16 (4) 351--371
EN Protection of infrastructures for e-science, including grid environments and NREN facilities, requires the use of novel techniques for anomaly detection and network monitoring. The aim is to raise situational awareness and provide early warning capabilities. The main operational problem that most ne[...]
8
100%
Studia i Materiały / Europejska Uczelnia Informatyczno-Ekonomiczna w Warszawie
2014 Nr 1(7) 73--82
PL W ramach projektu SECOR1 podjęto prace nad nowatorskimi metodami wykrywania anomalii w sieciach IP. Ostatnie badania wskazują, że odpowiednie do tego celu jest wykorzystanie miar entropijnych. W artykule zaprezentowano wyniki badań autorskiej detekcji anomalii bazującej na miarach entropijnych. Wyni[...]
EN The SECOR project goals include novel methods of anomalous traffic detection in IP networks. Recently, entropy measures have shown significant promise in detecting diverse set of network anomalies. While many different forms of entropy exist, only a few have been studied in the context of network an[...]
9
88%
Journal of Telecommunications and Information Technology
2011 nr 1 32-36
EN In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed. We propose to combine and correlate parameters from different layers in order to detect 0-day attacks and reduce false positives. Moreover, we propose to combine statistical and signal-based features[...]
10
88%
Image Processing & Communications
EN In our previous work innovative recognition algorithm applied to Anomaly Detection System has been presented. We proposed to use Matching Pursuit Mean Projection (MP-MP) of the reconstructed network signal to recognize anomalies in network traffic. In this paper we focus on evaluation of parameters [...]
11
88%
Annual of Navigation
2016 No. 23 135--149
PL Prezentowany artykuł omawia architekturę oprogramowania opracowanego na potrzeby projektu System for Intelligent Maritime Monitoring (SIMMO). System ten bazuje na najnowszych osiągnięciach w dziedzinach fuzji oraz inteligentnej analizy danych w celu generowania wzbogaconego obrazu sytuacji na morzu [...]
EN In this paper, we discuss a software architecture, which has been developed for the needs of the System for Intelligent Maritime Monitoring (SIMMO). The system bases on the state-of-the-art information fusion and intelligence analysis techniques, which generates an enhanced Recognized Maritime Pictu[...]
12
88%
Studia Informatica : systems and information technology
EN Anomaly detection methods are of common use in many fields, including databases and large computer systems. This article presents new algorithm based on negative feature selection, which can be used to find anomalies in real time. Proposed algorithm, called Negative Feature Selection algorithm (NegF[...]
13
88%
Geology, Geophysics and Environment
2016 Vol. 42, no. 3 269--277
EN The assessment of flood embankments is a key component of a country’s comprehensive flood protection. Proper and early information on the possible instability of a flood embankment can make it possible to take preventative action. The assessment method proposed by the ISMOP project is based on a st[...]
14
88%
Fundamenta Informaticae
2018 Vol. 161, nr 3 299--316
EN Cloud Collaboration Systems (CCS) offer efficient coordination among users to work on shared tasks in diverse distributed environments such as social networking, healthcare, wikis, and intelligent systems. Many cloud collaboration systems services are basically loosely coupled in nature. The flexibi[...]
15
75%
Metody Informatyki Stosowanej
2010 nr 2 (23) 105-115
PL Obecnie proponowany hybrydowy system wykrywania ataków robaków sieciowych, a wykorzystujący techniki eksploracji danych jest w fazie budowy. Jednak argumenty przedstawione w artykule pozwalają przypuszczać, że proponowany system wykaże się wysoką skutecznością i precyzją w wykrywaniu robaków interne[...]
EN Internet worms are a serious threat in today’s world. Most of conventional security systems do not protects users from zero-day worms which can cause many damage. This article presents the concept of data mining based worm detection hybrid system. It profiles the network traffic and detects anomalie[...]
16
75%
Computer Assisted Mechanics and Engineering Sciences
EN This paper presents a new dual model combining binary and real-valued representations of samples for negative selection algorithms. Recent research show that the two types of encoding can produce quite good results for some types of datasets when they are applied separately in such algorithms. Besid[...]
17
75%
Diagnostyka
PL W artykule przedstawiono problem związany ze zmieniającą się dynamicznie jakością paliwa podczas sterowania procesem spalania. Opisano sposób pomiaru zmiennych procesowych związanych z tym procesem. W kolejnej części artykułu autor przedstawił schemat, idee oraz działanie algorytmu genetycznego. Zos[...]
EN The article presents the problem of dynamically changing fuel quality during the control of combustion process. The way of the measurement process variables related with this process was described. In the next part of the article schematics, ideas and genetic algorithm were presented by the author. [...]
18
63%
Zeszyty Naukowe Politechniki Białostockiej. Informatyka
2007 Z. 2 39-49
PL Jednym z kluczowych parametrów algorytmów wykrywania anomalii jest metryka (norma) służąca do obliczania odległości pomiędzy dwiema próbkami, która odzwierciedla ich podobieństwo. Jest ona szczególnie istotna w przypadkach operowania na zbiorach o wielu wymiarach takich, z jakimi mamy do czynienia w[...]
EN One of the key parameters of algorithms for anomaly detection is the metric (norm) applied to calculate the distance between every two samples which reflect its proximity. It is especially important when we operate on real-valued high dimensional datasets, i.e. when we deal with the problem of intru[...]
19
63%
Przegląd Elektrotechniczny
2014 R. 90, nr 1 127--130
PL Analiza samopodobieństwa i wykrywania nieprawidłowości działania sieci stanowi interesujący problem dla naukowców na całym świecie. W artykule pokazano wykorzystanie współczynnika Hursta, jako parametru na podstawie którego można wykryć wszelkie anomalia pracy sieci. Odchylenia od wartości bazowej p[...]
EN Self-similarity analysis and anomaly detection in networks are interesting field of research and scientific work of scientists around the world. Simulation studies have demonstrated that the Hurst parameter estimation can be used to detect traffic anomaly – the Hurst values are compared with confide[...]
20
63%
Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne
2014 nr 10 1329--1334
PL Rozwój sieci komputerowych oraz teleinformatyki umożliwił zdobywanie wielkiej ilości danych. Istotna jest jednak wiedza z ich pomocą zdobywana. Jest to możliwe dzięki zastosowaniu eksploracji danych. Przedstawiono podstawowy podział metod eksploracji danych oraz rozliczne ich zastosowania w telekomu[...]
EN The modern development of computer networks and teleinformatics has enabled the acquisition of great amounts of data. However, the discovered knowledge is important. This is possible through the use of data mining. The article presents the basic division of data mining methods and their numerous app[...]
first rewind previous Strona / 2 next fast forward last