Browsing by Subject "Anomaly detection"
Now showing items 1-20 of 26
-
1D convolutional neural networks and applications: A survey
( Academic Press , 2021 , Article)During the last decade, Convolutional Neural Networks (CNNs) have become the de facto standard for various Computer Vision and Machine Learning operations. CNNs are feed-forward Artificial Neural Networks (ANNs) with ... -
A new thermal integrity method for pile anomaly detection
( DEStech Publications Inc. , 2019 , Conference Paper)Anomaly detection is a hot topic in pile construction which is a complex one due to the intrinsic nature of underground structures, such as limited accessibility, large depth and complex soil profile. Several traditional ... -
An innovative edge-based Internet of Energy solution for promoting energy saving in buildings
( Elsevier , 2022 , Article)Due to the ubiquity and maturity of Artificial Intelligence (AI), it became an essential tool in the development real-time Internet of energy (IoE) solutions. Also, since cloud platforms are not being the first implementation ... -
Anomaly Detection in Blockchain-enabled Supply Chain: An Ontological Approach
( Qatar University Press , 2021 , Poster)In our proposed work, we propose an anomaly detection framework, for detecting anomalous transactions in business processes from transaction event logs. Such a framework will help enhance the accuracy of anomaly detection ... -
Anomaly Detection in Blockchain-Enabled Supply Chain: An Ontological Approach
( Springer Science and Business Media Deutschland GmbH , 2022 , Conference Paper)In our work, we propose an anomaly detection framework, for detecting anomalous transactions in business processes from transaction event logs. Such a framework will help enhance the accuracy of anomaly detection in the ... -
Anomaly Detection: A Survey
( Springer Science and Business Media Deutschland GmbH , 2022 , Conference Paper)Anomaly detection (AD) is considered one of the important research areas that have a diverse range of application domains. Some of the anomaly detection techniques presented in the literature were specifically implemented ... -
Application of data-driven attack detection framework for secure operation in smart buildings
( Elsevier Ltd , 2021 , Article)With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the ... -
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
( Elsevier , 2021 , Article Review)Enormous amounts of data are being produced everyday by sub-meters and smart sensors installed in residential buildings. If leveraged properly, that data could assist end-users, energy producers and utility companies in ... -
Automated detection of anomalies in sewer closed circuit television videos using proportional data modeling
( International Society for Trenchless Technology , 2016 , Conference Paper)Sewer pipeline condition information is usually collected using closed circuit television (CCTV). Moreover, in order to evaluate the condition of pipeline, data should be processed by a certified operator, which is time ... -
Denial-of-service attack on iec 61850-based substation automation system: A crucial cyber threat towards smart substation pathways
( MDPI , 2021 , Article)The generation of the mix-based expansion of modern power grids has urged the utilization of digital infrastructures. The introduction of Substation Automation Systems (SAS), advanced networks and communication technologies ... -
Detecting anomalies within smart buildings using do-it-yourself internet of things
( Springer , 2022 , Article)Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We ... -
Detection of Appliance-Level Abnormal Energy Consumption in Buildings Using Autoencoders and Micro-moments
( Springer Science and Business Media Deutschland GmbH , 2022 , Conference Paper)The detection of anomalous energy usage could help significantly in signaling energy wastage and identifying faulty appliances, especially if the individual power traces are analyzed. To that end, this paper proposes a ... -
Dynamical observer for continuous linear Roesser systems
( Elsevier B.V. , 2020 , Conference Paper)Monitoring of industrial systems for anomalies such as faults and cyber-attacks as unknown and extremely undesirable inputs in the presence of other inputs (like disturbances) is an important issue for ensuring the safety ... -
Hybrid Machine Learning for Network Anomaly Intrusion Detection
( IEEE , 2020 , Conference Paper)In this paper, a hybrid approach of combing two machine learning algorithms is proposed to detect the different possible attacks by performing effective feature selection and classification. This system uses Random Forest ... -
Iterative per Group Feature Selection for Intrusion Detection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ... -
Machine Learning Based Cloud Computing Anomalies Detection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Recently, machine learning algorithms have been proposed to design new security systems for anomalies detection as they exhibit fast processing with real-time predictions. However, one of the major challenges in machine ... -
Machine Learning Techniques for Network Anomaly Detection: A Survey
( IEEE , 2020 , Conference Paper)Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit ... -
Multi-layer security scheme for implantable medical devices
( Springer , 2020 , Article)Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ... -
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
( Springer Science and Business Media Deutschland GmbH , 2021 , Article)The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ... -
Outlier detection approaches based on machine learning in the internet-of-things
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Outlier detection in the Internet of Things (IoT) is an essential challenge issue studied in numerous fields, including fraud monitoring, intrusion detection, secure localization, trust management, and so on. Conventional ...