Your selections:
Efficient graph learning for anomaly detection systems
Proposed machine learning techniques for bridge structural health monitoring : a laboratory study
- Noori Hoshyar, Azadeh, Rashidi, Maria, Yu, Yang, Samali, Bijan
Trust-aware detection of malicious users in dating social networks
- Shen, Xingfa, Lv, Wentao, Qiu, Jianhui, Kaur, Achhardeep, Xiao, Fengjun, Xia, Feng
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Rashid, Mamanur, Kamruzzaman, Joarder, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven
Anomaly detection on health data
- Samariya, Durgesh, Ma, Jiangang
Educational anomaly analytics : features, methods, and challenges
- Guo, Teng, Bai, Xiaomei, Tian, Xue, Firmin, Sally, Xia, Feng
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
Deep video anomaly detection : opportunities and challenges
- Ren, Jing, Xia, Feng, Liu, Yemeng, Lee, Ivan
How to optimize an academic team when the outlier member is leaving?
- Yu, Shuo, Liu, Jiaying, Wei, Haoran, Xia, Feng, Tong, Hanghang
Cyberattacks detection in iot-based smart city applications using machine learning techniques
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Imam, Tassadduq, Gordon, Steven
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
- Razzak, Imran, Zafar, Khurram, Imran, Muhammad, Xu, Guandong
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Isolation-based anomaly detection using nearest-neighbor ensembles
- Bandaragoda, Tharindu, Ting, Kaiming, Albrecht, David, Liu, Fei, Zhu, Ye, Wells, Jonathan
Classification under streaming emerging new classes : A solution using completely-random trees
- Mu, Xin, Ting, Kaiming, Zhou, Zhi-Hua
Defying the gravity of learning curve : A characteristic of nearest neighbour anomaly detectors
- Ting, Kaiming, Washio, Takashi, Wells, Jonathan, Aryal, Sunil
Are you sure you would like to clear your session, including search history and login status?