Sökning: "Anomaly Detection"
Visar resultat 1 - 5 av 80 avhandlingar innehållade orden Anomaly Detection.
1. Conformal anomaly detection : Detecting abnormal trajectories in surveillance applications
Sammanfattning : Human operators of modern surveillance systems are confronted with an increasing amount of trajectory data from moving objects, such as people, vehicles, vessels, and aircraft. A large majority of these trajectories reflect routine traffic and are uninteresting. LÄS MER
2. Anomaly detection in the surveillance domain
Sammanfattning : In the post September 11 era, the demand for security has increased in virtually all parts of the society. The need for increased security originates from the emergence of new threats which differ from the traditional ones in such a way that they cannot be easily defined and are sometimes unknown or hidden in the “noise” of daily life. LÄS MER
3. Visual analytics for maritime anomaly detection
Sammanfattning : The surveillance of large sea areas typically involves the analysis of huge quantities of heterogeneous data. In order to support the operator while monitoring maritime traffic, the identification of anomalous behavior or situations that might need further investigation may reduce operators' cognitive load. LÄS MER
4. Traffic Analysis, Modeling and Their Applications in Energy-Constrained Wireless Sensor Networks : On Network Optimization and Anomaly Detection
Sammanfattning : Wireless sensor network (WSN) has emerged as a promising technology thanks to the recent advances in electronics, networking, and information processing. A wide range of WSN applications have been proposed such as habitat monitoring, environmental observations and forecasting systems, health monitoring, etc. LÄS MER
5. Adaptive Real-time Anomaly Detection for Safeguarding Critical Networks
Sammanfattning : Critical networks require defence in depth incorporating many different security technologies including intrusion detection. One important intrusion detection approach is called anomaly detection where normal (good) behaviour of users of the protected system is modelled, often using machine learning or data mining techniques. LÄS MER