Filter your results
- 61
- 60
- 1
- 61
- 8
- 48
- 3
- 5
- 8
- 6
- 6
- 7
- 3
- 2
- 6
- 4
- 4
- 6
- 1
- 61
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
On Detecting Abrupt Changes in Network Entropy Time Series12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.194-205, ⟨10.1007/978-3-642-24712-5_18⟩
Conference papers
hal-01596209v1
|
||
|
MoVA: A Visual Analytics Tool Providing Insight in the Big Mobile Network Data11th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015), Sep 2015, Bayonne, France. pp.383-396, ⟨10.1007/978-3-319-23868-5_27⟩
Conference papers
hal-01385373v1
|
||
|
Anomaly Detection and Mitigation at Internet Scale: A Survey7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.49-60, ⟨10.1007/978-3-642-38998-6_7⟩
Conference papers
hal-01489970v1
|
||
|
Hybrid Negative Selection Approach for Anomaly Detection11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers
hal-01551730v1
|
||
|
Cyber Security of the Application Layer of Mission Critical Industrial Systems15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.342-351, ⟨10.1007/978-3-319-45378-1_31⟩
Conference papers
hal-01637452v1
|
||
|
Deep Dense and Convolutional Autoencoders for Machine Acoustic Anomaly Detection17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.337-348, ⟨10.1007/978-3-030-79150-6_27⟩
Conference papers
hal-03287664v1
|
||
|
Unsupervised Multi-sensor Anomaly Localization with Explainable AI18th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2022, Hersonissos, Greece. pp.507-519, ⟨10.1007/978-3-031-08333-4_41⟩
Conference papers
hal-04317155v1
|
||
|
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.351-367, ⟨10.1007/978-3-319-99277-8_19⟩
Conference papers
hal-01988832v1
|
||
|
Protocol-Independent Detection of Dictionary Attacks19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.304-309, ⟨10.1007/978-3-642-40552-5_30⟩
Conference papers
hal-01497030v1
|
||
|
KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment10th International Conference on Intelligent Information Processing (IIP), Oct 2018, Nanning, China. pp.311-320, ⟨10.1007/978-3-030-00828-4_31⟩
Conference papers
hal-02197807v1
|
||
|
A Fuzzy Load Balancer for Adaptive Fault Tolerance Management in Cloud Platforms6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.109-124, ⟨10.1007/978-3-319-67262-5_9⟩
Conference papers
hal-01677613v1
|
||
|
Hunting the Unknown28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers
hal-01284860v1
|
||
|
Industrial Control System Fingerprinting and Anomaly Detection9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.73-85, ⟨10.1007/978-3-319-26567-4_5⟩
Conference papers
hal-01431014v1
|
||
|
Boosted Ensemble Learning for Anomaly Detection in 5G RAN16th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2020, Neos Marmaras, Greece. pp.15-30, ⟨10.1007/978-3-030-49161-1_2⟩
Conference papers
hal-04050604v1
|
||
|
Flow-Based Detection of DNS Tunnels7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers
hal-01489962v1
|
||
|
Unsupervised Anomaly Detection of Healthcare Providers Using Generative Adversarial Networks19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.419-430, ⟨10.1007/978-3-030-44999-5_35⟩
Conference papers
hal-03222815v1
|
||
|
Anomaly Detection from Network Logs Using Diffusion Maps12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.172-181, ⟨10.1007/978-3-642-23957-1_20⟩
Conference papers
hal-01571332v1
|
||
|
An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.195-208, ⟨10.1007/978-3-642-24580-0_14⟩
Conference papers
hal-01583915v1
|
||
|
Learning Entropy10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.15-27, ⟨10.1007/978-3-642-20757-0_2⟩
Conference papers
hal-01583407v1
|
||
|
GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.196-211, ⟨10.1007/978-3-030-45778-5_13⟩
Conference papers
hal-03266474v1
|
||
|
Anomaly Detection for Mobile Device Comfort8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.93-108, ⟨10.1007/978-3-662-43813-8_7⟩
Conference papers
hal-01381681v1
|
||
|
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.31-46, ⟨10.1007/978-3-642-12368-9_3⟩
Conference papers
hal-01056068v1
|
||
|
Network Anomaly Detection Using Parameterized Entropy13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers
hal-01405630v1
|
||
|
Multi-source Distributed System Data for AI-Powered Analytics8th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2020, Heraklion, Crete, Greece. pp.161-176, ⟨10.1007/978-3-030-44769-4_13⟩
Conference papers
hal-03203288v1
|
||
|
An Intelligent Defense and Filtration Platform for Network TrafficInternational Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.107-118, ⟨10.1007/978-3-030-02931-9_9⟩
Conference papers
hal-02269743v1
|
||
|
Online Detection of Operator Errors in Cloud Computing Using Anti-patterns7th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA), Dec 2017, Neuchatel, Switzerland. pp.1-24, ⟨10.1007/978-3-030-11638-5_1⟩
Conference papers
hal-02060694v1
|
||
|
System Problem Detection by Mining Process Model from Console Logs14th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2017, Hefei, China. pp.140-144, ⟨10.1007/978-3-319-68210-5_16⟩
Conference papers
hal-01705438v1
|
||
|
Towards a Distributed Learning Architecture for Securing ISP Home Customers17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.311-322, ⟨10.1007/978-3-030-79157-5_26⟩
Conference papers
hal-03789041v1
|
||
|
Towards a Trustworthy Patient Home-Care Thanks to an Edge-Node Infrastructure8th International Conference on Human-Centred Software Engineering (HCSE), Nov 2020, Eindhoven, Netherlands. pp.181-189, ⟨10.1007/978-3-030-64266-2_11⟩
Conference papers
hal-03250491v1
|
||
|
Aggregation of Network Protocol Data Near Its Source2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.482-491, ⟨10.1007/978-3-642-55032-4_49⟩
Conference papers
hal-01397258v1
|