Effective Anomaly detection in Sensor Network Data Streams
This paper addresses a major challenge in datamining applications where the full information about the underlying processes, such as sensor networks or large online database, cannot be practically obtained due to physical limitations such as low bandwidth or memory, storage, or computing power. Moti...
| Main Authors: | Pham, DucSon, Saha , Budhaditya, Lazarescu, Mihai, Venkatesh, Svetha |
|---|---|
| Other Authors: | Wei Wang |
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2009
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/12001 |
Similar Items
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Stream Quantiles via Maximal Entropy Histograms
by: Arandjelovic, O., et al.
Published: (2014)
by: Arandjelovic, O., et al.
Published: (2014)
Efficient algorithms for robust recovery of images from compressed data
by: Pham, DucSon, et al.
Published: (2013)
by: Pham, DucSon, et al.
Published: (2013)
Improved image recovery from compressed data contaminated with impulsive noise
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Compressive speech enhancement
by: Low, S., et al.
Published: (2013)
by: Low, S., et al.
Published: (2013)
Towards enhancing unsupervised anomaly detection by improving complexity, dimensionality and class-boundary properties
by: Babaei, Kasra
Published: (2022)
by: Babaei, Kasra
Published: (2022)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Infrequent Item mining in multiple data streams
by: Saha, Budhaditya, et al.
Published: (2007)
by: Saha, Budhaditya, et al.
Published: (2007)
A fast extension for sparse representation on robust face recognition
by: Qiu, Hui-ning, et al.
Published: (2010)
by: Qiu, Hui-ning, et al.
Published: (2010)
Event composition and detection in data stream management systems
by: Mohania, M., et al.
Published: (2005)
by: Mohania, M., et al.
Published: (2005)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Graph-based clustering with DRepStream
by: Callister, R., et al.
Published: (2017)
by: Callister, R., et al.
Published: (2017)
An Immunology-inspired Multi-engine Anomaly Detection System with Hybrid Particle Swarm Optimisations
by: Jiang, F., et al.
Published: (2012)
by: Jiang, F., et al.
Published: (2012)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Clustering Patient Medical Records via Sparse Subspace Representation
by: Budhaditya, S., et al.
Published: (2013)
by: Budhaditya, S., et al.
Published: (2013)
Sparse Subspace Clustering via Group Sparse Coding
by: Budhaditya, S., et al.
Published: (2013)
by: Budhaditya, S., et al.
Published: (2013)
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
by: Teoh, Chin Chuang
Published: (2005)
by: Teoh, Chin Chuang
Published: (2005)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Efficient and accurate set-based registration of time-separated aerial images
by: Arandjelovic, O., et al.
Published: (2015)
by: Arandjelovic, O., et al.
Published: (2015)
Improved Subspace Clustering via Exploitation of Spatial Constraints
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
by: Raja Wahab, Raja Azhan Syah
Published: (2024)
by: Raja Wahab, Raja Azhan Syah
Published: (2024)
Bayesian Nonparametric Approaches to Abnormality Detection in Video Surveillance
by: Nguyen, V., et al.
Published: (2015)
by: Nguyen, V., et al.
Published: (2015)
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
by: Pradhan, Biswajeet
Published: (2006)
by: Pradhan, Biswajeet
Published: (2006)
The low volatility anomaly in Chinese equity market
by: Hong, Zhuoling
Published: (2023)
by: Hong, Zhuoling
Published: (2023)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
The Determination and Application of Vector Gravity Anomalies
by: Featherstone, Will, et al.
Published: (2000)
by: Featherstone, Will, et al.
Published: (2000)
New views of the spherical Bouguer gravity anomaly
by: Vanicek, P., et al.
Published: (2004)
by: Vanicek, P., et al.
Published: (2004)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
A study of web application firewall solutions
by: Prandl, S., et al.
Published: (2015)
by: Prandl, S., et al.
Published: (2015)
The adaptable buffer algorithm for high quantile estimation in non-stationary data streams
by: Arandjelovic, O., et al.
Published: (2015)
by: Arandjelovic, O., et al.
Published: (2015)
Computation of Probability Coefficients using Binary Decision Diagram and their Application in Test Vector Generation
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
Localised Gross-error Detection in the Australian Land Gravity Database
by: Sproule, David, et al.
Published: (2006)
by: Sproule, David, et al.
Published: (2006)
Two Maximum Entropy-Based Algorithms for Running Quantile Estimation in Nonstationary Data Streams
by: Arandjelovic, O., et al.
Published: (2015)
by: Arandjelovic, O., et al.
Published: (2015)
Similar Items
-
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014) -
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011) -
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012) -
Stream Quantiles via Maximal Entropy Histograms
by: Arandjelovic, O., et al.
Published: (2014) -
Efficient algorithms for robust recovery of images from compressed data
by: Pham, DucSon, et al.
Published: (2013)