Search - IFIP Open Digital Library Access content directly

Filter your results

61 results
level0_domain_s : Computer Science [cs]
Keywords : Anomaly detection
Image document

On Detecting Abrupt Changes in Network Entropy Time Series

Philipp Winter , Harald Lampesberger , Markus Zeilinger , Eckehard Hermann
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.194-205, ⟨10.1007/978-3-642-24712-5_18⟩
Conference papers hal-01596209v1
Image document

MoVA: A Visual Analytics Tool Providing Insight in the Big Mobile Network Data

Ilias Kalamaras , Stavros Papadopoulos , Anastasios Drosou , Dimitrios Tzovaras
11th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015), Sep 2015, Bayonne, France. pp.383-396, ⟨10.1007/978-3-319-23868-5_27⟩
Conference papers hal-01385373v1
Image document

Anomaly Detection and Mitigation at Internet Scale: A Survey

Jessica Steinberger , Lisa Schehlmann , Sebastian Abt , Harald Baier
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.49-60, ⟨10.1007/978-3-642-38998-6_7⟩
Conference papers hal-01489970v1
Image document

Hybrid Negative Selection Approach for Anomaly Detection

Andrzej Chmielewski , Sławomir T. Wierzchoń
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.242-253, ⟨10.1007/978-3-642-33260-9_21⟩
Conference papers hal-01551730v1
Image document

Cyber Security of the Application Layer of Mission Critical Industrial Systems

Rafał Kozik , Michał Choraś , Rafał Renk , Witold Hołubowicz
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.342-351, ⟨10.1007/978-3-319-45378-1_31⟩
Conference papers hal-01637452v1
Image document

Deep Dense and Convolutional Autoencoders for Machine Acoustic Anomaly Detection

Gabriel Coelho , Pedro Pereira , Luis Matos , Alexandrine Ribeiro , Eduardo C. Nunes , et al.
17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.337-348, ⟨10.1007/978-3-030-79150-6_27⟩
Conference papers hal-03287664v1
Image document

Unsupervised Multi-sensor Anomaly Localization with Explainable AI

Mina Ameli , Viktor Pfanschilling , Anar Amirli , Wolfgang Maaß , Kristian Kersting
18th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2022, Hersonissos, Greece. pp.507-519, ⟨10.1007/978-3-031-08333-4_41⟩
Conference papers hal-04317155v1
Image document

Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers

Chun-Fai Chan , Kam-Pui Chow , Siu-Ming Yiu , Ken Yau
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.351-367, ⟨10.1007/978-3-319-99277-8_19⟩
Conference papers hal-01988832v1
Image document

Protocol-Independent Detection of Dictionary Attacks

Martin Drašar
19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.304-309, ⟨10.1007/978-3-642-40552-5_30⟩
Conference papers hal-01497030v1
Image document

KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment

Youchang Xu , Ningjiang Chen , Ruwei Huang , Hanlin Zhang
10th International Conference on Intelligent Information Processing (IIP), Oct 2018, Nanning, China. pp.311-320, ⟨10.1007/978-3-030-00828-4_31⟩
Conference papers hal-02197807v1
Image document

A Fuzzy Load Balancer for Adaptive Fault Tolerance Management in Cloud Platforms

Hamid Arabnejad , Claus Pahl , Giovani Estrada , Areeg Samir , Frank Fowley
6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.109-124, ⟨10.1007/978-3-319-67262-5_9⟩
Conference papers hal-01677613v1
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

Industrial Control System Fingerprinting and Anomaly Detection

Yong Peng , Chong Xiang , Haihui Gao , Dongqing Chen , Wang Ren
9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.73-85, ⟨10.1007/978-3-319-26567-4_5⟩
Conference papers hal-01431014v1
Image document

Boosted Ensemble Learning for Anomaly Detection in 5G RAN

Tobias Sundqvist , Monowar H. Bhuyan , Johan Forsman , Erik Elmroth
16th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2020, Neos Marmaras, Greece. pp.15-30, ⟨10.1007/978-3-030-49161-1_2⟩
Conference papers hal-04050604v1
Image document

Flow-Based Detection of DNS Tunnels

Wendy Ellens , Piotr Żuraniewski , Anna Sperotto , Harm Schotanus , Michel Mandjes , et al.
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers hal-01489962v1
Image document

Unsupervised Anomaly Detection of Healthcare Providers Using Generative Adversarial Networks

Krishnan Naidoo , Vukosi Marivate
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.419-430, ⟨10.1007/978-3-030-44999-5_35⟩
Conference papers hal-03222815v1
Image document

Anomaly Detection from Network Logs Using Diffusion Maps

Tuomo Sipola , Antti Juvonen , Joel Lehtonen
12th Engineering Applications of Neural Networks (EANN 2011) and 7th Artificial Intelligence Applications and Innovations (AIAI), Sep 2011, Corfu, Greece. pp.172-181, ⟨10.1007/978-3-642-23957-1_20⟩
Conference papers hal-01571332v1
Image document

An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services

Hiroyuki Shinbo , Toru Hasegawa
23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.195-208, ⟨10.1007/978-3-642-24580-0_14⟩
Conference papers hal-01583915v1
Image document

Learning Entropy

Lele Zhang , Darryl Veitch
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.15-27, ⟨10.1007/978-3-642-20757-0_2⟩
Conference papers hal-01583407v1
Image document

GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN

Taku Wakui , Takao Kondo , Fumio Teraoka
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.196-211, ⟨10.1007/978-3-030-45778-5_13⟩
Conference papers hal-03266474v1
Image document

Anomaly Detection for Mobile Device Comfort

Mehmet Vefa Bicakci , Babak Esfandiari , Stephen Marsh
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.93-108, ⟨10.1007/978-3-662-43813-8_7⟩
Conference papers hal-01381681v1
Image document

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones

Tansu Alpcan , Christian Bauckhage , Aubrey-Derrick Schmidt
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.31-46, ⟨10.1007/978-3-642-12368-9_3⟩
Conference papers hal-01056068v1
Image document

Network Anomaly Detection Using Parameterized Entropy

Przemysław Bereziński , Marcin Szpyrka , Bartosz Jasiul , Michał Mazur
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers hal-01405630v1
Image document

Multi-source Distributed System Data for AI-Powered Analytics

Sasho Nedelkoski , Jasmin Bogatinovski , Ajay Kumar Mandapati , Soeren Becker , Jorge Cardoso , et al.
8th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2020, Heraklion, Crete, Greece. pp.161-176, ⟨10.1007/978-3-030-44769-4_13⟩
Conference papers hal-03203288v1
Image document

An Intelligent Defense and Filtration Platform for Network Traffic

Mehrnoosh Monshizadeh , Vikramajeet Khatri , Buse Atli , Raimo Kantola
International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2018, Boston, MA, United States. pp.107-118, ⟨10.1007/978-3-030-02931-9_9⟩
Conference papers hal-02269743v1
Image document

Online Detection of Operator Errors in Cloud Computing Using Anti-patterns

Arthur Vetter
7th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA), Dec 2017, Neuchatel, Switzerland. pp.1-24, ⟨10.1007/978-3-030-11638-5_1⟩
Conference papers hal-02060694v1
Image document

System Problem Detection by Mining Process Model from Console Logs

Jian Li , Jian Cao
14th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2017, Hefei, China. pp.140-144, ⟨10.1007/978-3-319-68210-5_16⟩
Conference papers hal-01705438v1
Image document

Towards a Distributed Learning Architecture for Securing ISP Home Customers

Pedro M. Santos , Joana Sousa , Ricardo Morla , Nuno Martins , João Tagaio , et al.
17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.311-322, ⟨10.1007/978-3-030-79157-5_26⟩
Conference papers hal-03789041v1
Image document

Towards a Trustworthy Patient Home-Care Thanks to an Edge-Node Infrastructure

Carmelo Ardito , Tommaso Di Noia , Eugenio Di Sciascio , Domenico Lofú , Giulio Mallardi , et al.
8th International Conference on Human-Centred Software Engineering (HCSE), Nov 2020, Eindhoven, Netherlands. pp.181-189, ⟨10.1007/978-3-030-64266-2_11⟩
Conference papers hal-03250491v1
Image document

Aggregation of Network Protocol Data Near Its Source

Marcel Fourné , Kevin Stegemann , Dominique Petersen , Norbert Pohlmann
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.482-491, ⟨10.1007/978-3-642-55032-4_49⟩
Conference papers hal-01397258v1