Academic literature on the topic 'Anomaly'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anomaly.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anomaly"
Ilahude, Delyuzar. "MAGNETIC ANOMALY PATTERNS USING TREND SURFACE ANALYSIS APPLICATION (TSA) ON MARINE GEOLOGY MAPPING IN THE BALIKPAPAN WATERS." BULLETIN OF THE MARINE GEOLOGY 27, no. 1 (February 15, 2016): 19. http://dx.doi.org/10.32693/bomg.27.1.2012.42.
Full textMuhajirin, Muhajirin, Nazli Ismail, and Bukhari Bukhari. "The Computation of Residual and Regional Anomaly of Gravity Method Data By Polynomial Filter Using Microsoft Excel." Journal of Aceh Physics Society 9, no. 2 (May 1, 2020): 37–41. http://dx.doi.org/10.24815/jacps.v9i2.15745.
Full textSubagio, Subagio, and Tatang Patmawidjaya. "POLA ANOMALI BOUGUER DAN ANOMALI MAGNET DAN KAITANNYA DENGAN PROSPEK SUMBER DAYA MINERAL DAN ENERGI DI PULAU LAUT, PULAU SEBUKU DAN SELAT SEBUKU, KALIMANTAN SELATAN." JURNAL GEOLOGI KELAUTAN 11, no. 3 (February 16, 2016): 115. http://dx.doi.org/10.32693/jgk.11.3.2013.236.
Full textPanjaitan, Saultan, and Subagio Subagio. "POLA ANOMALI GAYABERAT DAERAH TALIABU-MANGOLE DAN LAUT SEKITARNYA TERKAIT DENGAN PROSPEK MINYAK BUMI DAN GAS." JURNAL GEOLOGI KELAUTAN 12, no. 2 (February 16, 2016): 65. http://dx.doi.org/10.32693/jgk.12.2.2014.247.
Full textIlahude, Delyuzar, and Beben Rachmat. "POLA ANOMALI MAGNET LOKAL DARI APLIKASI TREND SURFACE ANALYSIS (TSA) PADA PEMETAAN GEOLOGI KELAUTAN BERSISTEM DI PERAIRAN SELAT MALAKA SUMATERA UTARA." JURNAL GEOLOGI KELAUTAN 9, no. 2 (February 16, 2016): 109. http://dx.doi.org/10.32693/jgk.9.2.2011.204.
Full textHafizhah, Luthfia, and Dwi Pujiastuti. "Perbandingan Anomali Frekuensi Kritis Lapisan F2 (Fof2) Ionosfer Pada Gempa Bumi Laut Dan Gempa Bumi Darat Pulau Sumatera." Jurnal Fisika Unand 10, no. 1 (February 17, 2021): 41–47. http://dx.doi.org/10.25077/jfu.10.1.41-47.2021.
Full textAngo, Christian Imanuel, Dolfie Paulus Pandara, Ferdy Ferdy, and Seni H. J. Tongkukut. "Investigasi Anomali TEC-Ionosfer Sebelum Letusan Gunung Lokon 14 Juli 2011 Menggunakan Metode Sliding Interquartile." Jurnal MIPA 9, no. 1 (January 24, 2020): 28. http://dx.doi.org/10.35799/jmuo.9.1.2020.27677.
Full textMu’awanah, Frida Rosidatul, Bambang Priadi, Widodo Widodo, I. Gde Sukadana, and Rian Andriansyah. "Mobilitas Uranium pada Endapan Sedimen Sungai Aktif di Daerah Mamuju, Sulawesi Barat." EKSPLORIUM 39, no. 2 (January 31, 2019): 95. http://dx.doi.org/10.17146/eksplorium.2018.39.2.4953.
Full textRahman, Fathu, Taufik Edy Sutanto, and Nina Fitriyati. "Web Traffic Anomaly Detection using Stacked Long Short-Term Memory." InPrime: Indonesian Journal of Pure and Applied Mathematics 3, no. 2 (November 10, 2021): 112–21. http://dx.doi.org/10.15408/inprime.v3i2.21879.
Full textAlviana, Sopian, and Irfan Dwiguna Sumitra. "ANALISIS PENGUKURAN PENGGUNAAN SUMBER DAYA KOMPUTER PADA INTRUSION DETECTION SYSTEM DALAM MEMINIMALKAN SERANGAN JARINGAN." Komputa : Jurnal Ilmiah Komputer dan Informatika 7, no. 1 (March 19, 2018): 27–34. http://dx.doi.org/10.34010/komputa.v7i1.2533.
Full textDissertations / Theses on the topic "Anomaly"
Ståhl, Björn. "Online Anomaly Detection." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2825.
Full textSutton, Patrick James. "The dimensional-reduction anomaly." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ59681.pdf.
Full textTran, Thi Minh Hanh. "Anomaly detection in video." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22443/.
Full textBarone, Joshua M. "Automated Timeline Anomaly Detection." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1609.
Full textSamuelsson, Jonas. "Anomaly Detection in ConsoleLogs." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-314514.
Full textDas, Mahashweta. "Spatio-Temporal Anomaly Detection." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1261540196.
Full textMazel, Johan. "Unsupervised network anomaly detection." Thesis, Toulouse, INSA, 2011. http://www.theses.fr/2011ISAT0024/document.
Full textAnomaly detection has become a vital component of any network in today’s Internet. Ranging from non-malicious unexpected events such as flash-crowds and failures, to network attacks such as denials-of-service and network scans, network traffic anomalies can have serious detrimental effects on the performance and integrity of the network. The continuous arising of new anomalies and attacks create a continuous challenge to cope with events that put the network integrity at risk. Moreover, the inner polymorphic nature of traffic caused, among other things, by a highly changing protocol landscape, complicates anomaly detection system's task. In fact, most network anomaly detection systems proposed so far employ knowledge-dependent techniques, using either misuse detection signature-based detection methods or anomaly detection relying on supervised-learning techniques. However, both approaches present major limitations: the former fails to detect and characterize unknown anomalies (letting the network unprotected for long periods) and the latter requires training over labeled normal traffic, which is a difficult and expensive stage that need to be updated on a regular basis to follow network traffic evolution. Such limitations impose a serious bottleneck to the previously presented problem.We introduce an unsupervised approach to detect and characterize network anomalies, without relying on signatures, statistical training, or labeled traffic, which represents a significant step towards the autonomy of networks. Unsupervised detection is accomplished by means of robust data-clustering techniques, combining Sub-Space clustering with Evidence Accumulation or Inter-Clustering Results Association, to blindly identify anomalies in traffic flows. Correlating the results of several unsupervised detections is also performed to improve detection robustness. The correlation results are further used along other anomaly characteristics to build an anomaly hierarchy in terms of dangerousness. Characterization is then achieved by building efficient filtering rules to describe a detected anomaly. The detection and characterization performances and sensitivities to parameters are evaluated over a substantial subset of the MAWI repository which contains real network traffic traces.Our work shows that unsupervised learning techniques allow anomaly detection systems to isolate anomalous traffic without any previous knowledge. We think that this contribution constitutes a great step towards autonomous network anomaly detection.This PhD thesis has been funded through the ECODE project by the European Commission under the Framework Programme 7. The goal of this project is to develop, implement, and validate experimentally a cognitive routing system that meet the challenges experienced by the Internet in terms of manageability and security, availability and accountability, as well as routing system scalability and quality. The concerned use case inside the ECODE project is network anomaly
Leto, Kevin. "Anomaly detection in HPC systems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textMartin, Xiumin. "Accrual persistence and accrual anomaly." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/4824.
Full textThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on September 28, 2007) Vita. Includes bibliographical references.
Nguyen, Quyen Do. "Anomaly handling in visual analytics." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-122307-132119/.
Full textBooks on the topic "Anomaly"
Brian, Haberlin, Van Dyke Geirrod, and Takenaga Francis, eds. Anomaly. Los Angeles, CA: Anomaly Publishing, 2012.
Find full textFleming, Neil. Anomaly. Toronto, Ont: Playwrights Guild of Canada/Tim Foil Cup Creative, 2005.
Find full textSmith, Raymond A. The American Anomaly. Fourth Edition. | New York: Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781351034821.
Full textBook chapters on the topic "Anomaly"
Shekhar, Shashi, and Hui Xiong. "Anomaly Detection." In Encyclopedia of GIS, 20. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_57.
Full textFriedewald, Vincent E. "Ebstein Anomaly." In Clinical Guide to Cardiovascular Disease, 615–22. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7293-2_46.
Full textCorno, Antonio F. "Ebstein’s anomaly." In Congenital Heart Defects, 73–78. Heidelberg: Steinkopff, 2003. http://dx.doi.org/10.1007/978-3-642-57358-3_11.
Full textPark, In Sook, Soo-Jin Kim, and Hyun Woo Goo. "Ebstein’s Anomaly." In An Illustrated Guide to Congenital Heart Disease, 391–411. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6978-0_17.
Full textDuplij, Steven, Martin Schlichenmaier, Rolf Schimmrigk, Martin Schlichenmaier, Maxim Vybornov, Dimilry Leites, Masud Chaichian, et al. "Anomaly Matching." In Concise Encyclopedia of Supersymmetry, 33–34. Dordrecht: Springer Netherlands, 2004. http://dx.doi.org/10.1007/1-4020-4522-0_22.
Full textChen, Thomas, Jürgen Fuchs, Steven Duplij, Evgeniy Ivanov, Steven Duplij, Alexander Gavrilik, Massimo Bianchi, et al. "Holomorphic Anomaly." In Concise Encyclopedia of Supersymmetry, 192. Dordrecht: Springer Netherlands, 2004. http://dx.doi.org/10.1007/1-4020-4522-0_251.
Full textKibler, Maurice, Mohammed Daoud, Maurice Kibler, I. Carrillo-Ibarra, Hugo Garcia-Compean, Volodymyr Mazorchuk, Ingo Runkel, et al. "Konishi Anomaly." In Concise Encyclopedia of Supersymmetry, 220. Dordrecht: Springer Netherlands, 2004. http://dx.doi.org/10.1007/1-4020-4522-0_288.
Full textDearani, Joseph A., and Constantine Mavroudis. "Ebstein Anomaly." In Atlas of Adult Congenital Heart Surgery, 337–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-14163-9_17.
Full textRhodes, Jonathan, and Alexander R. Opotowsky. "Ebstein’s Anomaly." In Exercise Physiology for the Pediatric and Congenital Cardiologist, 145–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16818-6_20.
Full textHofbeck, Michael, Karl-Heinz Deeg, and Thomas Rupprecht. "Ebstein’s Anomaly." In Doppler Echocardiography in Infancy and Childhood, 131–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-42919-9_10.
Full textConference papers on the topic "Anomaly"
Zhang, Wanting, Le Gao, Shaoyong Li, and Wenqi Li. "Anomaly Detection with Partially Observed Anomaly Types." In 2021 2nd International Conference on Computer Communication and Network Security (CCNS). IEEE, 2021. http://dx.doi.org/10.1109/ccns53852.2021.00028.
Full textAkcay, Samet, Dick Ameln, Ashwin Vaidya, Barath Lakshmanan, Nilesh Ahuja, and Utku Genc. "Anomalib: A Deep Learning Library for Anomaly Detection." In 2022 IEEE International Conference on Image Processing (ICIP). IEEE, 2022. http://dx.doi.org/10.1109/icip46576.2022.9897283.
Full textLin, T. Y. "Anomaly detection." In Proceedings New Security Paradigms Workshop. IEEE, 1994. http://dx.doi.org/10.1109/nspw.1994.656226.
Full textYepmo, Véronne. "Anomaly Explanation." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/844.
Full textChen, Xinqiang, Lumei Su, Guansen Deng, Mingyong Huang, Jiajun Wu, and Yanqing Peng. "Weak anomaly-reinforced autoencoder for unsupervised anomaly detection." In Thirteenth International Conference on Machine Vision, edited by Wolfgang Osten, Jianhong Zhou, and Dmitry P. Nikolaev. SPIE, 2021. http://dx.doi.org/10.1117/12.2587017.
Full textBlum, Ashlae. "A Temporal Approach to Unsupervised Anomaly Detection." In A Temporal Approach to Unsupervised Anomaly Detection. US DOE, 2021. http://dx.doi.org/10.2172/1825324.
Full textTian, Bowen, Qinliang Su, and Jian Yin. "Anomaly Detection by Leveraging Incomplete Anomalous Knowledge with Anomaly-Aware Bidirectional GANs." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/313.
Full textGu, Xiaowei, and Plamen Angelov. "Autonomous anomaly detection." In 2017 Evolving and Adaptive Intelligent Systems (EAIS). IEEE, 2017. http://dx.doi.org/10.1109/eais.2017.7954831.
Full textBhatkar, S., A. Chaturvedi, and R. Sekar. "Dataflow anomaly detection." In 2006 IEEE Symposium on Security and Privacy. IEEE, 2006. http://dx.doi.org/10.1109/sp.2006.12.
Full textNatoli, Christopher, and Vincent Gramoli. "The Blockchain Anomaly." In 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). IEEE, 2016. http://dx.doi.org/10.1109/nca.2016.7778635.
Full textReports on the topic "Anomaly"
Pieper, S. C., and R. B. Wiringa. Nolen-Schiffer anomaly. Office of Scientific and Technical Information (OSTI), August 1995. http://dx.doi.org/10.2172/166459.
Full textSchock, Alfred. Multicouple Anomaly Interpretation. Office of Scientific and Technical Information (OSTI), August 1986. http://dx.doi.org/10.2172/1033356.
Full textHayes-Sterbenz, Anna. The Reactor Neutrino Anomaly. Office of Scientific and Technical Information (OSTI), June 2013. http://dx.doi.org/10.2172/1084506.
Full textArbuckle, B., W. Breen, and A. H. Mumin. Richardson pluton uranium anomaly. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2015. http://dx.doi.org/10.4095/296621.
Full textMiles, W., and D. Oneschuk. Magnetic anomaly map, Canada. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2016. http://dx.doi.org/10.4095/297337.
Full textJobin, D. M., M. Véronneau, and W. Miles. Gravity anomaly map, Canada. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2017. http://dx.doi.org/10.4095/299561.
Full textWu, Jin Ginger, Lu Zhang, and X. Frank Zhang. Understanding the Accrual Anomaly. Cambridge, MA: National Bureau of Economic Research, October 2007. http://dx.doi.org/10.3386/w13525.
Full textMiles, W. F., W. R. Roest, and M. P. Vo. Magnetic anomaly map, Canada. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2000. http://dx.doi.org/10.4095/211516.
Full textMiles, W. F., W. R. Roest, and M. P. Vo. Gravity anomaly map, Canada. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2000. http://dx.doi.org/10.4095/211519.
Full textNg, B. Survey of Anomaly Detection Methods. Office of Scientific and Technical Information (OSTI), October 2006. http://dx.doi.org/10.2172/900157.
Full text