<--- Back to Details
First PageDocument Content
Mobile technology / Technology / Data mining / Wireless / Mobile telecommunications / Videotelephony / Anomaly detection / Data security / Machine learning / Local outlier factor / Computer network / UMTS
Date: 2018-10-23 09:34:50
Mobile technology
Technology
Data mining
Wireless
Mobile telecommunications
Videotelephony
Anomaly detection
Data security
Machine learning
Local outlier factor
Computer network
UMTS

Visual Analytics for enhancing supervised attack attribution in mobile networks∗ Stavros Papadopoulos, Vasilios Mavroudis, Anastasios Drosou, and Dimitrios Tzovaras Abstract Researchers have recently uncovered numerous

Add to Reading List

Source URL: mavroud.is

Download Document from Source Website

File Size: 1,26 MB

Share Document on Facebook

Similar Documents

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

DocID: 1xTRV - View Document

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

DocID: 1xTRg - View Document

Anomaly detection based on real-time exploitation of billing systems

Anomaly detection based on real-time exploitation of billing systems

DocID: 1xTmR - View Document

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

DocID: 1vnK6 - View Document

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

DocID: 1vlla - View Document