Journal articles on the topic 'Network anomally'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network anomally.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
García González, Gastón, Pedro Casas, Alicia Fernández, and Gabriel Gómez. "On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series." ACM SIGMETRICS Performance Evaluation Review 48, no. 4 (2021): 49–52. http://dx.doi.org/10.1145/3466826.3466843.
Full textDymora, Paweł, Miroslaw Mazurek, and Sławomir Jaskółka. "VoIP Anomaly Detection - selected methods of statistical analysis." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 14. http://dx.doi.org/10.17951/ai.2016.16.2.14.
Full textPatel, Darsh, Kathiravan Srinivasan, Chuan-Yu Chang, Takshi Gupta, and Aman Kataria. "Network Anomaly Detection inside Consumer Networks—A Hybrid Approach." Electronics 9, no. 6 (2020): 923. http://dx.doi.org/10.3390/electronics9060923.
Full textLalitha, K. V., and V. R. Josna. "Traffic Verification for Network Anomaly Detection in Sensor Networks." Procedia Technology 24 (2016): 1400–1405. http://dx.doi.org/10.1016/j.protcy.2016.05.161.
Full textNaseer, Sheraz, Yasir Saleem, Shehzad Khalid, et al. "Enhanced Network Anomaly Detection Based on Deep Neural Networks." IEEE Access 6 (2018): 48231–46. http://dx.doi.org/10.1109/access.2018.2863036.
Full textZhang, Huajie, Sen Zhang, and Marlia Mohd Hanafiah. "Localization and recognition algorithm for fuzzy anomaly data in big data networks." Open Physics 16, no. 1 (2018): 1076–84. http://dx.doi.org/10.1515/phys-2018-0128.
Full textDas, Krishna, and Smriti Kumar Sinha. "Centrality measure based approach for detection of malicious nodes in twitter social network." International Journal of Engineering & Technology 7, no. 4.5 (2018): 518. http://dx.doi.org/10.14419/ijet.v7i4.5.21147.
Full textNaseer, Sheraz, Rao Faizan Ali, P. D. D. Dominic, and Yasir Saleem. "Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures." Symmetry 12, no. 11 (2020): 1882. http://dx.doi.org/10.3390/sym12111882.
Full textLópez-Vizcaíno, Manuel, Carlos Dafonte, Francisco Nóvoa, Daniel Garabato, and M. Álvarez. "Network Data Unsupervised Clustering to Anomaly Detection." Proceedings 2, no. 18 (2018): 1173. http://dx.doi.org/10.3390/proceedings2181173.
Full textPrabhakar, T. S., and M. N. Veena. "Review on Anomaly Detection in Mobile Networks Using Traditional Learning, Machine Learning and Deep Learning." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 4789–96. http://dx.doi.org/10.1166/jctn.2020.9054.
Full textKabore, Raogo, Hyacinthe Kouassi Konan, Adlès Kouassi, Yvon Kermarrec, Philippe Lenca, and Olivier Asseu. "HYBRID DEEP NEURAL NETWORK ANOMALY DETECTION SYSTEM FOR SCADA NETWORKS." Far East Journal of Mathematical Sciences (FJMS) 128, no. 2 (2021): 141–91. http://dx.doi.org/10.17654/ms128020141.
Full textGao, Minghui, Li Ma, Heng Liu, Zhijun Zhang, Zhiyan Ning, and Jian Xu. "Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis." Sensors 20, no. 5 (2020): 1452. http://dx.doi.org/10.3390/s20051452.
Full textBEN-OTHMAN, JALEL, LYNDA MOKDAD, and SOUHEILA BOUAM. "AMCLM: ADAPTIVE MULTI-SERVICES CROSS-LAYER MAC PROTOCOL FOR IEEE 802.11 NETWORKS." Journal of Interconnection Networks 10, no. 04 (2009): 283–301. http://dx.doi.org/10.1142/s0219265909002583.
Full textTao, Xiaoling, Yang Peng, Feng Zhao, Peichao Zhao, and Yong Wang. "A parallel algorithm for network traffic anomaly detection based on Isolation Forest." International Journal of Distributed Sensor Networks 14, no. 11 (2018): 155014771881447. http://dx.doi.org/10.1177/1550147718814471.
Full textNakkeeran, R., T. Aruldoss Albert, and R. Ezumalai. "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks." International Journal of Engineering and Technology 2, no. 1 (2010): 52–56. http://dx.doi.org/10.7763/ijet.2010.v2.99.
Full textAllahdadi, Anisa, Ricardo Morla, and Jaime S. Cardoso. "802.11 wireless simulation and anomaly detection using HMM and UBM." SIMULATION 96, no. 12 (2020): 939–56. http://dx.doi.org/10.1177/0037549720958480.
Full textAli, Wasim Ahmed, Manasa K. N, Mohammed Aljunid, Malika Bendechache, and P. Sandhya. "Review of Current Machine Learning Approaches for Anomaly Detection in Network Traffic." Journal of Telecommunications and the Digital Economy 8, no. 4 (2020): 64–95. http://dx.doi.org/10.18080/jtde.v8n4.307.
Full textMaulana, Asep, and Martin Atzmueller. "Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks." Applied Sciences 11, no. 9 (2021): 4005. http://dx.doi.org/10.3390/app11094005.
Full textFotiadou, Konstantina, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, and Theodore Zahariadis. "Network Traffic Anomaly Detection via Deep Learning." Information 12, no. 5 (2021): 215. http://dx.doi.org/10.3390/info12050215.
Full textYang, Qi, Xuan Zhang, Jingfeng Qian, and Qiang Ye. "An anomaly node detection method for distributed time synchronization algorithm in cognitive radio sensor networks." International Journal of Distributed Sensor Networks 14, no. 5 (2018): 155014771877446. http://dx.doi.org/10.1177/1550147718774467.
Full textAbuadlla, Yousef, Goran Kvascev, Slavko Gajin, and Zoran Jovanovic. "Flow-based anomaly intrusion detection system using two neural network stages." Computer Science and Information Systems 11, no. 2 (2014): 601–22. http://dx.doi.org/10.2298/csis130415035a.
Full textSun, Bo, Xuemei Shan, Kui Wu, and Yang Xiao. "Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks." IEEE Systems Journal 7, no. 1 (2013): 13–25. http://dx.doi.org/10.1109/jsyst.2012.2223531.
Full textFranke, Conny, Marcel Karnstedt, Daniel Klan, Michael Gertz, Kai-Uwe Sattler, and Elena Chervakova. "In-network detection of anomaly regions in sensor networks with obstacles." Computer Science - Research and Development 24, no. 3 (2009): 153–70. http://dx.doi.org/10.1007/s00450-009-0063-y.
Full textGutiérrez-Gómez, Leonardo, Alexandre Bovet, and Jean-Charles Delvenne. "Multi-Scale Anomaly Detection on Attributed Networks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 678–85. http://dx.doi.org/10.1609/aaai.v34i01.5409.
Full textBurgueño, Jesús, Isabel de-la-Bandera, Jessica Mendoza, David Palacios, Cesar Morillas, and Raquel Barco. "Online Anomaly Detection System for Mobile Networks." Sensors 20, no. 24 (2020): 7232. http://dx.doi.org/10.3390/s20247232.
Full textSun, Teng, Hui Tian, and Xuan Mei. "Anomaly detection and localization by diffusion wavelet-based analysis on traffic matrix." Computer Science and Information Systems 12, no. 4 (2015): 1361–74. http://dx.doi.org/10.2298/csis141001059s.
Full textZhao, Chensu, Yang Xin, Xuefeng Li, Hongliang Zhu, Yixian Yang, and Yuling Chen. "An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks." Applied Sciences 10, no. 22 (2020): 8160. http://dx.doi.org/10.3390/app10228160.
Full textShin, Mi Young, Deuk Jae Cho, Yun-Ja Yoo, Cheol-Ye Hong, and Sang-Hyun Park. "Anomaly Detection Technique of Satellite on Network RTK." Journal of Navigation and Port Research 37, no. 1 (2013): 41–48. http://dx.doi.org/10.5394/kinpr.2013.37.1.41.
Full textAndrysiak, Tomasz, and Łukasz Saganowski. "Anomaly detection system based on sparse signal representation." Image Processing & Communications 16, no. 3-4 (2011): 37–44. http://dx.doi.org/10.2478/v10248-012-0010-6.
Full textLi, Ming, Dezhi Han, Xinming Yin, Han Liu, and Dun Li. "Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features." Security and Communication Networks 2021 (August 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/7045823.
Full textEstévez-Pereira, Julio J., Diego Fernández, and Francisco J. Novoa. "Network Anomaly Detection Using Machine Learning Techniques." Proceedings 54, no. 1 (2020): 8. http://dx.doi.org/10.3390/proceedings2020054008.
Full textZhou, Renjie, Xiao Wang, Jingjing Yang, Wei Zhang, and Sanyuan Zhang. "Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy." Security and Communication Networks 2021 (June 16, 2021): 1–9. http://dx.doi.org/10.1155/2021/5560185.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textTian, Hui, Jingtian Liu, and Meimei Ding. "Promising techniques for anomaly detection on network traffic." Computer Science and Information Systems 14, no. 3 (2017): 597–609. http://dx.doi.org/10.2298/csis170201018h.
Full textChugh, Neeraj, Geetam Singh Tomar, Robin Singh Bhadoria, and Neetesh Saxena. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14 (2021): 1635. http://dx.doi.org/10.3390/electronics10141635.
Full textSaqib, Muhammad, Farrukh Zeeshan Khan, Muneer Ahmed, and Raja Majid Mehmood. "A critical review on security approaches to software-defined wireless sensor networking." International Journal of Distributed Sensor Networks 15, no. 12 (2019): 155014771988990. http://dx.doi.org/10.1177/1550147719889906.
Full textZhang, Dinghua, Yibo Hu, Guoyan Cao, et al. "Dataflow Feature Analysis for Industrial Networks Communication Security." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 38, no. 1 (2020): 199–208. http://dx.doi.org/10.1051/jnwpu/20203810199.
Full textAristizábal Q, Luz Angela, and Nicolás Toro G. "Multilayer Representation and Multiscale Analysis on Data Networks." International journal of Computer Networks & Communications 13, no. 3 (2021): 41–55. http://dx.doi.org/10.5121/ijcnc.2021.13303.
Full textXue, Feng, Weizhong Yan, Tianyi Wang, Hao Huang, and Bojun Feng. "Deep anomaly detection for industrial systems: a case study." Annual Conference of the PHM Society 12, no. 1 (2020): 8. http://dx.doi.org/10.36001/phmconf.2020.v12i1.1186.
Full textValiveti, Sharada Ramakrishna, Anush Manglani, and Tadrush Desai. "Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks." International Journal of Systems and Software Security and Protection 12, no. 2 (2021): 11–32. http://dx.doi.org/10.4018/ijsssp.2021070102.
Full textIrawan, Bambang. "Fenomena Anomali Iklim El Nino dan La Nina: Kecenderungan Jangka Panjang dan Pengaruhnya terhadap Produksi Pangan." Forum penelitian Agro Ekonomi 24, no. 1 (2016): 28. http://dx.doi.org/10.21082/fae.v24n1.2006.28-45.
Full textTahir, Muhammad, Mingchu Li, Naeem Ayoub, and Muhammad Aamir. "Efficacy Improvement of Anomaly Detection by Using Intelligence Sharing Scheme." Applied Sciences 9, no. 3 (2019): 364. http://dx.doi.org/10.3390/app9030364.
Full textLi, Meng, Shuangxin Wang, Shanxiang Fang, and Juchao Zhao. "Anomaly Detection of Wind Turbines Based on Deep Small-World Neural Network." Applied Sciences 10, no. 4 (2020): 1243. http://dx.doi.org/10.3390/app10041243.
Full textHuang, Che-Hsuan, Pei-Hsuan Lee, Shu-Hsiu Chang, et al. "Automated Optical Inspection Method for Light-Emitting Diode Defect Detection Using Unsupervised Generative Adversarial Neural Network." Crystals 11, no. 9 (2021): 1048. http://dx.doi.org/10.3390/cryst11091048.
Full textVigoya, Laura, Diego Fernandez, Victor Carneiro, and Fidel Cacheda. "Annotated Dataset for Anomaly Detection in a Data Center with IoT Sensors." Sensors 20, no. 13 (2020): 3745. http://dx.doi.org/10.3390/s20133745.
Full textKodituwakku, Hansaka Angel Dias Edirisinghe, Alex Keller, and Jens Gregor. "InSight2: A Modular Visual Analysis Platform for Network Situational Awareness in Large-Scale Networks." Electronics 9, no. 10 (2020): 1747. http://dx.doi.org/10.3390/electronics9101747.
Full textBin, Wang, Zhi Chao Zhao, and Yong Cheng Jiang. "The Application of Network Anomaly Mining Technology in Campus Network Information Security." Advanced Materials Research 756-759 (September 2013): 998–1002. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.998.
Full textLawal, Muhammad Aminu, Riaz Ahmed Shaikh, and Syed Raheel Hassan. "An Anomaly Mitigation Framework for IoT Using Fog Computing." Electronics 9, no. 10 (2020): 1565. http://dx.doi.org/10.3390/electronics9101565.
Full textPu, Jiansu, Jingwen Zhang, Hui Shao, Tingting Zhang, and Yunbo Rao. "egoDetect: Visual Detection and Exploration of Anomaly in Social Communication Network." Sensors 20, no. 20 (2020): 5895. http://dx.doi.org/10.3390/s20205895.
Full textWu, Renyong, Xue Deng, Rongxing Lu, and Xuemin (Sherman) Shen. "Trust-Based Anomaly Detection in Emerging Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/363569.
Full text