Your selections:
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Rashid, Mamanur, Kamruzzaman, Joarder, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Anomaly detection on health data
- Samariya, Durgesh, Ma, Jiangang
Autonomous behavior modeling approach for diverse anomaly detection application
- Amar, Muhammad, Wilson, Campbell, Gondal, Iqbal
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
Classification under streaming emerging new classes : A solution using completely-random trees
- Mu, Xin, Ting, Kaiming, Zhou, Zhi-Hua
Complex anomaly for enhanced machine independent condition monitoring
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Coupled attention networks for multivariate time series anomaly detection
- Xia, Feng, Chen, Xin, Yu, Shuo, Hou, Mingliang, Liu, Mujie, You, Linlin
Cyberattacks detection in iot-based smart city applications using machine learning techniques
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Imam, Tassadduq, Gordon, Steven
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Deep video anomaly detection : opportunities and challenges
- Ren, Jing, Xia, Feng, Liu, Yemeng, Lee, Ivan
Defying the gravity of learning curve : A characteristic of nearest neighbour anomaly detectors
- Ting, Kaiming, Washio, Takashi, Wells, Jonathan, Aryal, Sunil
Detection of anomalies and explanation in cybersecurity
- Samariya, Durgesh, Ma, Jiangang, Aryal, Sunil, Zhao, Xiaohui
Educational anomaly analytics : features, methods, and challenges
- Guo, Teng, Bai, Xiaomei, Tian, Xue, Firmin, Sally, Xia, Feng
Efficient graph learning for anomaly detection systems
Half-space mass : a maximally robust and efficient data depth method
- Chen, Bo, Ting, Kaiming, Washio, Takashi, Haffari, Gholamreza
How to optimize an academic team when the outlier member is leaving?
- Yu, Shuo, Liu, Jiaying, Wei, Haoran, Xia, Feng, Tong, Hanghang
Are you sure you would like to clear your session, including search history and login status?