Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding

    Yong Fang, Zhiying Zhao, Yijia Xu*, Zhonglin Liu

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4099-4118, 2023, DOI:10.32604/cmc.2023.033124

    Abstract System logs are essential for detecting anomalies, querying faults, and tracing attacks. Because of the time-consuming and labor-intensive nature of manual system troubleshooting and anomaly detection, it cannot meet the actual needs. The implementation of automated log anomaly detection is a topic that demands urgent research. However, the prior work on processing log data is mainly one-dimensional and cannot profoundly learn the complex associations in log data. Meanwhile, there is a lack of attention to the utilization of log labels and usually relies on a large number of labels for detection. This paper proposes a novel and practical detection model… More >

  • Open Access

    ARTICLE

    Anomaly Detection in Social Media Texts Using Optimal Convolutional Neural Network

    Swarna Sudha Muppudathi1, Valarmathi Krishnasamy2,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1027-1042, 2023, DOI:10.32604/iasc.2023.031165

    Abstract Social Networking Sites (SNSs) are nowadays utilized by the whole world to share ideas, images, and valuable contents by means of a post to reach a group of users. The use of SNS often inflicts the physical and the mental health of the people. Nowadays, researchers often focus on identifying the illegal behaviors in the SNS to reduce its negative influence. The state-of-art Natural Language processing techniques for anomaly detection have utilized a wide annotated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum accuracy. To overcome these issues, the proposed… More >

  • Open Access

    REVIEW

    Intelligent Identification over Power Big Data: Opportunities, Solutions, and Challenges

    Liang Luo1, Xingmei Li1, Kaijiang Yang1, Mengyang Wei1, Jiong Chen1, Junqian Yang1, Liang Yao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1565-1595, 2023, DOI:10.32604/cmes.2022.021198

    Abstract The emergence of power dispatching automation systems has greatly improved the efficiency of power industry operations and promoted the rapid development of the power industry. However, with the convergence and increase in power data flow, the data dispatching network and the main station dispatching automation system have encountered substantial pressure. Therefore, the method of online data resolution and rapid problem identification of dispatching automation systems has been widely investigated. In this paper, we perform a comprehensive review of automated dispatching of massive dispatching data from the perspective of intelligent identification, discuss unresolved research issues and outline future directions in this… More >

  • Open Access

    ARTICLE

    An Intelligent Intrusion Detection System in Smart Grid Using PRNN Classifier

    P. Ganesan1,*, S. Arockia Edwin Xavier2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2979-2996, 2023, DOI:10.32604/iasc.2023.029264

    Abstract Typically, smart grid systems enhance the ability of conventional power system networks as it is vulnerable to several kinds of attacks. These vulnerabilities might cause the attackers or intruders to collapse the entire network system thus breaching the confidentiality and integrity of smart grid systems. Thus, for this purpose, Intrusion detection system (IDS) plays a pivotal part in offering a reliable and secured range of services in the smart grid framework. Several existing approaches are there to detect the intrusions in smart grid framework, however they are utilizing an old dataset to detect anomaly thus resulting in reduced rate of… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively… More >

  • Open Access

    ARTICLE

    Anomaly Detection and Pattern Differentiation in Monitoring Data from Power Transformers

    Jun Zhao1, Shuguo Gao1, Yunpeng Liu2,3, Quan Wang2,*, Ziqiang Xu2, Yuan Tian1, Lu Sun1

    Energy Engineering, Vol.119, No.5, pp. 1811-1828, 2022, DOI:10.32604/ee.2022.020490

    Abstract Aiming at the problem of abnormal data generated by a power transformer on-line monitoring system due to the influences of transformer operation state change, external environmental interference, communication interruption, and other factors, a method of anomaly recognition and differentiation for monitoring data was proposed. Firstly, the empirical wavelet transform (EWT) and the autoregressive integrated moving average (ARIMA) model were used for time series modelling of monitoring data to obtain the residual sequence reflecting the anomaly monitoring data value, and then the isolation forest algorithm was used to identify the abnormal information, and the monitoring sequence was segmented according to the… More >

  • Open Access

    ARTICLE

    Abnormal Crowd Behavior Detection Using Optimized Pyramidal Lucas-Kanade Technique

    G. Rajasekaran1,*, J. Raja Sekar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2399-2412, 2023, DOI:10.32604/iasc.2023.029119

    Abstract Abnormal behavior detection is challenging and one of the growing research areas in computer vision. The main aim of this research work is to focus on panic and escape behavior detections that occur during unexpected/uncertain events. In this work, Pyramidal Lucas Kanade algorithm is optimized using EMEHOs to achieve the objective. First stage, OPLKT-EMEHOs algorithm is used to generate the optical flow from MIIs. Second stage, the MIIs optical flow is applied as input to 3 layer CNN for detect the abnormal crowd behavior. University of Minnesota (UMN) dataset is used to evaluate the proposed system. The experimental result shows… More >

  • Open Access

    REVIEW

    Anomaly Detection in Textured Images with a Convolutional Neural Network for Quality Control of Micrometric Woven Meshes

    Pierre-Frédéric Villard1,*, Maureen Boudart2, Ioana Ilea3, Fabien Pierre1

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.6, pp. 1639-1648, 2022, DOI:10.32604/fdmp.2022.021726

    Abstract Industrial woven meshes are composed of metal materials and are often used in construction, industrial and residential activities or applications. The objective of this work is defect detection in industrial fabrics in the quality control stage. In order to overcome the limitations of manual methods, which are often tedious and time-consuming, we propose a strategy that can automatically detect defects in micrometric steel meshes by means of a Convolutional Neural Network. The database used for such a purpose comes from real problem data for anomaly detection in micrometric woven meshes. This detection is performed through supervised classification with a Convolutional… More >

  • Open Access

    ARTICLE

    Compared Insights on Machine-Learning Anomaly Detection for Process Control Feature

    Ming Wan1, Quanliang Li1, Jiangyuan Yao2,*, Yan Song3, Yang Liu4, Yuxin Wan5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4033-4049, 2022, DOI:10.32604/cmc.2022.030895

    Abstract Anomaly detection is becoming increasingly significant in industrial cyber security, and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks. However, different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples. As a sequence, after developing one feature generation approach, the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm. Based on process control features generated by directed function transition diagrams, this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their… More >

  • Open Access

    ARTICLE

    An Optimized and Hybrid Framework for Image Processing Based Network Intrusion Detection System

    Murtaza Ahmed Siddiqi, Wooguil Pak*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3921-3949, 2022, DOI:10.32604/cmc.2022.029541

    Abstract The network infrastructure has evolved rapidly due to the ever-increasing volume of users and data. The massive number of online devices and users has forced the network to transform and facilitate the operational necessities of consumers. Among these necessities, network security is of prime significance. Network intrusion detection systems (NIDS) are among the most suitable approaches to detect anomalies and assaults on a network. However, keeping up with the network security requirements is quite challenging due to the constant mutation in attack patterns by the intruders. This paper presents an effective and prevalent framework for NIDS by merging image processing… More >

Displaying 41-50 on page 5 of 100. Per Page