Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Anomaly Detection at Multiple Scales (view), Network behavior anomaly detection (view)

searching for Anomaly detection 134 found (376 total)

alternate case: anomaly detection

Magnetic anomaly detector (790 words) [view diff] case mismatch in snippet view article find links to article

Wang, Siwei; Chen, Dixiang; Hu, Jingtao; Pan, Xue (2019). "Magnetic Anomaly Detection Based on Full Connected Neural Network". IEEE Access. 7. IEEE: 182198
Global Maritime Situational Awareness (463 words) [view diff] exact match in snippet view article find links to article
"Maritime anomaly detection" returns a large number of hits from a wide range of domains. Some of the related topics are: Maritime anomaly detection and situation
ML.NET (1,625 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approaches
Anti-submarine weapon (3,957 words) [view diff] case mismatch in snippet view article find links to article
anti-submarine forces also began employing autogyro aircraft and Magnetic Anomaly Detection (MAD) equipment to sink U.S. subs, particularly those plying major
Anomaly-based intrusion detection system (557 words) [view diff] exact match in snippet view article find links to article
recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors
Tracing (software) (1,312 words) [view diff] exact match in snippet view article
fall into a terminological gray area. Tracing is primarily used for anomaly detection, fault analysis, debugging or diagnostic purposes in distributed software
Anodot (725 words) [view diff] exact match in snippet view article find links to article
learning and artificial intelligence for business monitoring and anomaly detection. Anodot was founded in 2014 by David Drai along with Ira Cohen, former
NetQoS (308 words) [view diff] case mismatch in snippet view article find links to article
company was acquired by CA Technologies include: Performance Center Anomaly Detection Network latency calculator Earlier offerings include: SuperAgent a
Mark Burgess (computer scientist) (2,268 words) [view diff] exact match in snippet view article
the proof of concept platform using these methods for system state anomaly detection, from 2002 to the present, and received widespread use. Based on these
Automated X-ray inspection (1,386 words) [view diff] exact match in snippet view article find links to article
of the inspection are used to optimize following processing steps, Anomaly detection, i.e. the result of the inspection serve as a criterion to reject
Comparison of cognitive architectures (143 words) [view diff] exact match in snippet view article find links to article
Hierarchical Temporal Memory connectionist online learning, anomaly detection ? anomaly detection active 2009 Hawkins et al (multiple) AGPL LIDA symbolic
Argus – Audit Record Generation and Utilization System (829 words) [view diff] case mismatch in snippet view article find links to article
traffic measurement data for network forensics and Network Behavior Anomaly Detection (NBAD). Argus has been used extensively in cybersecurity, end-to-end
Rebecca Bace (944 words) [view diff] case mismatch in snippet view article find links to article
National Security Agency where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computer
RoboNet (472 words) [view diff] exact match in snippet view article find links to article
2008, RoboNet-II has been using the expert system for microlensing anomaly detection that is being provided by the Automated Robotic Terrestrial Exoplanet
Medoid (4,019 words) [view diff] exact match in snippet view article find links to article
identifying anomalies, and one efficient method is through cluster-based anomaly detection. They can be used to discover clusters of data points that deviate
Anderson function (762 words) [view diff] exact match in snippet view article find links to article
along an arbitrary line. They are useful in the study of magnetic anomaly detection, with historical applications in submarine hunting and underwater
Flowmon Networks (631 words) [view diff] exact match in snippet view article find links to article
probes and collectors by analytical features for network behavior anomaly detection, network awareness application performance management, DDoS detection
Jugal Kalita (186 words) [view diff] case mismatch in snippet view article find links to article
for Students and Professionals, 2003, Universal Publishers Network Anomaly Detection: A Machine Learning Perspective, with Dhruba K. Bhattacharyya, 2013
Vir Phoha (787 words) [view diff] exact match in snippet view article find links to article
research focuses on attack-averse authentication, spoof-resistance, anomaly detection, machine learning, optimized attack formulation, and spatial-temporal
Diffusion map (2,469 words) [view diff] exact match in snippet view article find links to article
speaker verification and identification, sampling on manifolds, anomaly detection, image inpainting, revealing brain resting state networks organization
Dasient (406 words) [view diff] exact match in snippet view article find links to article
behavioral-based engine - based on sophisticated algorithms and anomaly detection technology - to defend against the latest attacks using up-to-date
Abiodun Musa Aibinu (898 words) [view diff] case mismatch in snippet view article find links to article
Matters. Performance Evaluation of You Only Look Once v4 in Road Anomaly Detection and Visual Simultaneous Localisation and Mapping for Autonomous Vehicles
OpenText Data Protector (550 words) [view diff] case mismatch in snippet view article find links to article
additional security features like Multi-Factor Authentication and Anomaly Detection have been added. Today's version of Data Protector provides full backwards
HSM-49 (818 words) [view diff] case mismatch in snippet view article find links to article
advanced airborne active sonar. It is not equipped with the Magnetic Anomaly Detection (MAD) that the SH-60B employed. Pilot instrumentation is provided
Data lineage (6,167 words) [view diff] no match in snippet view article find links to article
Data lineage includes the data origin, what happens to it, and where it moves over time. Data lineage provides visibility and simplifies tracing errors
Dhruba K. Bhattacharyya (345 words) [view diff] case mismatch in snippet view article find links to article
is the vice-chancellor (in-charge) of Tezpur University. Network Anomaly Detection: A Machine Learning Perspective, with Jugal K Kalita, 2013, CRC Press
Zeek (645 words) [view diff] exact match in snippet view article find links to article
another Zeek script. Zeek analyzers perform application layer decoding, anomaly detection, signature matching and connection analysis. Zeek's developers designed
Prognostics (3,745 words) [view diff] exact match in snippet view article find links to article
configure and customize the algorithms for signature extraction, anomaly detection, health assessment, failure diagnosis, and failure prediction for
Election forensics (742 words) [view diff] exact match in snippet view article find links to article
forensics: Using machine learning and synthetic data for possible election anomaly detection". PLOS ONE. 14 (10): e0223950. Bibcode:2019PLoSO..1423950Z. doi:10
Security visualisation (511 words) [view diff] exact match in snippet view article find links to article
varying shades and patterns of color gradient. ELISHA is a visual anomaly detection system. The tool aims at identifying multiple origin autonomous system
Wireless sensor network (6,401 words) [view diff] exact match in snippet view article find links to article
use. This technique has been used, for instance, for distributed anomaly detection or distributed optimization. As nodes can inspect the data they forward
DHS Border and Maritime Security Division (371 words) [view diff] exact match in snippet view article find links to article
examination by non-intrusive inspection Increased information fusion, anomaly detection, Automatic Target Recognition capability Detect and identify WMD materials
3 Corner Satellite (452 words) [view diff] exact match in snippet view article find links to article
Execution and Replanning (CASPER) software, and Context-sensitive anomaly detection software (SELMON monitoring system) NASA Jet Propulsion Laboratory
K-class blimp (2,467 words) [view diff] exact match in snippet view article find links to article
had a detection range of 90 mi (140 km), sonobuoys, and magnetic anomaly detection (MAD) equipment. The K-ships carried four 350 lb (160 kg) depth bombs
Kenitra Air Base (772 words) [view diff] exact match in snippet view article find links to article
shallow waters of the Straits of Gibraltar where radar and magnetic anomaly detection were viable. Craw Field was the final destination of the six K-ships
Lockheed P-3 Orion (11,318 words) [view diff] exact match in snippet view article find links to article
its distinctive tail stinger or "MAD" boom, used for the magnetic anomaly detection (MAD) of submarines. Over the years, the P-3 has seen numerous design
List of weapons of the Japanese Navy (1,515 words) [view diff] exact match in snippet view article find links to article
Kawanishi E7K2 ("Alf") Mark 2: short range seaplane, fitted with magnetic anomaly detection equipment and surface-search radar for short range patrol and antisubmarine
Airborne Real-time Cueing Hyperspectral Enhanced Reconnaissance (3,023 words) [view diff] exact match in snippet view article find links to article
matching where reflected light is matched to spectral signatures anomaly detection using a statistical model of the pixels in the image to determine
OSSIM (842 words) [view diff] exact match in snippet view article find links to article
address anomaly detection, replaced by PRADS. P0f, used for passive OS detection and OS change analysis, replaced by PRADS. PADS, used for service anomaly detection
Allot (company) (1,274 words) [view diff] case mismatch in snippet view article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 146 million (2021) Total equity US$ 126 million (2021)
Allot (company) (1,274 words) [view diff] case mismatch in snippet view article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 146 million (2021) Total equity US$ 126 million (2021)
Dorothy E. Denning (2,197 words) [view diff] exact match in snippet view article find links to article
developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI's
Naval aircrewman (2,250 words) [view diff] exact match in snippet view article find links to article
electronic warfare, active and passive sonar. Reading sonograms, magnetic anomaly detection equipment, physics, wave propagation, oceanography, meteorology and
English Wikipedia (3,801 words) [view diff] exact match in snippet view article find links to article
S2CID 61150982. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011
Real-time outbreak and disease surveillance (260 words) [view diff] case mismatch in snippet view article find links to article
Challenges Facing Early Outbreak Detection in Biosurveillance", Technometrics (Special Issue on Anomaly Detection), vol. 52, issue 1, pp. 39–51, 2010 v t e
Packet capture appliance (1,943 words) [view diff] exact match in snippet view article find links to article
techniques for network intrusion detection, traffic classification, and anomaly detection are used to identify potentially malicious traffic for collection
Anti-submarine warfare (7,657 words) [view diff] exact match in snippet view article find links to article
surprise and attack enemy submarines on the surface at night. Magnetic anomaly detection Diesel exhaust sniffers Sonobuoys Weaponry Depth charges, the most
Call graph (1,566 words) [view diff] exact match in snippet view article find links to article
Dawn (25 October 2004). "Gray-box extraction of execution graphs for anomaly detection". Proceedings of the 11th ACM conference on Computer and communications
Degaussing (2,757 words) [view diff] exact match in snippet view article find links to article
facilitate the detection of a submarine by ships or aircraft with magnetic anomaly detection (MAD) equipment. Navies use the deperming procedure, in conjunction
CFEngine (1,171 words) [view diff] exact match in snippet view article find links to article
re-write, CFEngine 2, which added features for machine learning, anomaly detection and secure communications. Between 1998 and 2004, CFEngine grew in
Mod qos (826 words) [view diff] exact match in snippet view article find links to article
upload/download throughput a client must generate. September 2009, Version 9: Anomaly detection using client characteristic measurement. February 2012, Version 10:
Webroot (1,827 words) [view diff] exact match in snippet view article find links to article
of CyberFlow Analytics, a company applying data science to network anomaly detection. In February 2019 Webroot announced that it would be acquired by Carbonite
Military helicopter (3,142 words) [view diff] exact match in snippet view article find links to article
King, to be equipped with integral dunking sonar, radar and magnetic anomaly detection equipment. The result was an aircraft able to more quickly respond
Webist (1,815 words) [view diff] case mismatch in snippet view article find links to article
Antti Juvonen. "GROWING HIERARCHICAL SELF-ORGANISING MAPS FOR ONLINE ANOMALY DETECTION BY USING NETWORK LOGS" Proceedings - Proceedings of the 7th International
Google Analytics (3,682 words) [view diff] exact match in snippet view article find links to article
built-in DebugView to analyze and debug the upcoming data instantly, Anomaly detection, Improved e-commerce reports. Has feature to analysis user journey
Naval Station Argentia (2,422 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and PB4Y-2) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Strait
IoBT-CRA (698 words) [view diff] exact match in snippet view article find links to article
tasks such as information collection, predictive processing, and data anomaly detection. Security: Methods of increasing the defenses of IoBTs such that the
Thomas G. Dietterich (2,777 words) [view diff] case mismatch in snippet view article find links to article
Dietterich, Shubhomoy Das (2016). Finite Sample Complexity of Rare Pattern Anomaly Detection. Uncertainty in Artificial Intelligence (UAI-2016). New York, NY Alkaee-Taleghan
Sense Networks (807 words) [view diff] case mismatch in snippet view article find links to article
Spatial-Temporal Trails in Location Analytics (US 20100079336), and Anomaly Detection in Sensor Analytics (US 20100082301). The company was acquired by
Honeytoken (469 words) [view diff] case mismatch in snippet view article find links to article
PMC 9185350. PMID 35684744. DLP and honeytokens IDS: RES: Protocol Anomaly Detection IDS – Honeypots Has my mailing list been stolen? | Plynt Security
Douglas B-18 Bolo (3,099 words) [view diff] exact match in snippet view article find links to article
bombardier was replaced by a search radar with a large radome. Magnetic anomaly detection (MAD) equipment was sometimes housed in a tail boom. These aircraft
NetMiner (803 words) [view diff] case mismatch in snippet view article find links to article
Two mode analysis modules and Mining(Classification, Regression, Anomaly Detection, Frequent Subgraph etc.) was added (Version: 4.2.0) Morphological
Hyper-surveillance (1,060 words) [view diff] exact match in snippet view article find links to article
Zhang, Y.; Li, M.; Dong, Z. Y.; Meng, K. (June 2019). "Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring". CSEE
Sea anemone (4,558 words) [view diff] case mismatch in snippet view article find links to article
Bojani (2011). Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer Science & Business
Shared Whois Project (397 words) [view diff] case mismatch in snippet view article find links to article
Gleichmann; Doug Montgomery (2009). "A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms". 2009 Cybersecurity Applications & Technology
Elastic NV (695 words) [view diff] exact match in snippet view article find links to article
Elastic acquired Prelert, a machine learning company specializing in anomaly detection. Swiftype - In 2017, Elastic acquired Swiftype, a provider of search
Glassbox (1,231 words) [view diff] exact match in snippet view article find links to article
and churn prediction, real-time fraud detection and prevention, and anomaly detection systems, and they could help enterprise clients anticipate issues
The Signpost (4,315 words) [view diff] exact match in snippet view article find links to article
2016. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011
Breakthrough Listen (3,505 words) [view diff] case mismatch in snippet view article find links to article
Seung Woo Son; Andrew Siemion; Steve Croft (2019). "Self-Supervised Anomaly Detection for Narrowband SETI". arXiv:1901.04636 [astro-ph.IM]. "Open Data"
Shaanxi Y-8 (3,110 words) [view diff] exact match in snippet view article find links to article
air-to-surface search radar, a side-looking ISAR radar and a magnetic anomaly detection tube. Y-8EW: New EW aircraft. Y-8 Gunship: A projected gunship version
Kansas Geological Survey (1,994 words) [view diff] no match in snippet view article find links to article
to advance the research and development of an automated subterrain anomaly-detection system using active seismic-imaging (ASI) technologies to be used
SKYNET (surveillance program) (450 words) [view diff] exact match in snippet view article
statistical discrepancies with behavioral abnormalities and that the anomaly detection methodology SKYNET perpetuates the self/other binary. For example
Social media measurement (1,921 words) [view diff] exact match in snippet view article find links to article
S2CID 13987132. Wang, Wei (2011). "Network traffic monitoring, analysis and anomaly detection [Guest Editorial]". IEEE Network. 25 (3): 6–7. doi:10.1109/mnet.2011
Turbomachinery (2,486 words) [view diff] case mismatch in snippet view article find links to article
Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application". International Joint Conference
Concept drift (2,896 words) [view diff] exact match in snippet view article find links to article
Numenta Anomaly Benchmark, benchmark for evaluating algorithms for anomaly detection in streaming, real-time applications. (2014–2018) 2014 [] Special
Lastline (967 words) [view diff] case mismatch in snippet view article find links to article
Countermeasure (computer) IT risk Machine learning Malware Network Behavior Anomaly Detection Threat (computer) Yokwicz, Will Watching the (Digital) Detectives
ThetaRay (1,035 words) [view diff] exact match in snippet view article find links to article
2016. "Transforming the way the world deals with data - intelligent anomaly detection by ThetaRay". The Silicon Review. Retrieved 2022-05-10. "ThetaRay
Peter Tippett (1,139 words) [view diff] exact match in snippet view article find links to article
image signatures, using hash-tables for trusted file execution and anomaly detection, aspects of mail merge and "un-do." He ran a bulletin board system
Cohesity (1,629 words) [view diff] exact match in snippet view article find links to article
provides anti-ransomware features including machine learning-based anomaly detection. Through the acquisition of Imanis Data in 2019, Cohesity extended
Wei Wang (computer scientist) (721 words) [view diff] case mismatch in snippet view article
pp. 197–206, 2018. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks, by Wenchao Yu, Wei Cheng, Charu Aggarwal, Kai
Battery electric vehicle (4,779 words) [view diff] exact match in snippet view article find links to article
management, the controller performs various safety checks such as anomaly detection, functional safety tests and failure diagnostics. Most electric vehicles
List of spatial analysis software (98 words) [view diff] exact match in snippet view article find links to article
geo-triggered events, dynamic and complex route calculations and automated anomaly detection are just a mouse click away. Independent benchmark tests by academia
HMS Wishart (2,909 words) [view diff] exact match in snippet view article find links to article
Navy PBY Catalina aircraft of Patrol Squadron 63 using magnetic anomaly detection equipment detected the German submarine U-761 near Tangier while U-761
Portugal during World War II (5,575 words) [view diff] exact match in snippet view article find links to article
of German U-boats around the Straits of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from Weeksville
Krishnendu Chakrabarty (795 words) [view diff] case mismatch in snippet view article find links to article
for his paper "Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques." He also received the 2021 Vitold Belevitch Award for
Cyber Assessment Framework (307 words) [view diff] exact match in snippet view article find links to article
Objective C: Detecting cyber security events C.1 Security monitoring C.2 Anomaly detection Objective D: Minimising the impact of cyber security incidents D.1
Netdata (1,170 words) [view diff] case mismatch in snippet view article find links to article
second and displayed instantly on intuitive dashboards. Unsupervised Anomaly Detection Utilizes machine learning to detect anomalies in given metrics, enabling
Naval Air Station South Weymouth (3,555 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and B-24s) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Straits
Primeval: New World (2,351 words) [view diff] exact match in snippet view article find links to article
his cooperation on the anomalies, but is rebuffed. Toby creates an anomaly detection system by hacking the local cell phone network, and immediately detects
Vishal Monga (773 words) [view diff] case mismatch in snippet view article find links to article
in Color Image Processing: Methods and Applications (2006) "Video Anomaly Detection" in Computer Vision and Imaging in Intelligent Transportation Systems
Neptune Mission (811 words) [view diff] exact match in snippet view article find links to article
Neptune aircraft. The advent of airborne radar, sonar and magnetic anomaly detection (MAD)-equipped aircraft such as the Neptune, made for a potent counter
Underwater searches (10,541 words) [view diff] exact match in snippet view article find links to article
ships. Air searches can be done for magnetic targets using magnetic anomaly detection (MAD) systems, which use a sensitive magnetometer carried by an aircraft
Lajes Field (4,101 words) [view diff] exact match in snippet view article find links to article
for German U-boats around the Strait of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from Weeksville
IBM System Management Facilities (1,355 words) [view diff] exact match in snippet view article find links to article
log-based and metric-based machine learning technology to provide anomaly detection. IBM Db2 Analytics Accelerator for z/OS, a database application that
Small Satellite Research Laboratory (1,177 words) [view diff] exact match in snippet view article find links to article
from motion, surface reconstruction, data compression, and oceanic anomaly detection. UGA Small Satellite Research Laboratory Team and History [1] Faculty
VP-5 (4,904 words) [view diff] exact match in snippet view article find links to article
1948 VP-ML-5 received the first P2V Neptune, equipped with magnetic anomaly detection (MAD) equipment capable of detecting large magnetic objects underwater
Cheating in online games (5,957 words) [view diff] no match in snippet view article find links to article
On online games, cheating subverts the rules or mechanics of the games to gain an unfair advantage over other players, generally with the use of third-party
Fault detection and isolation (3,228 words) [view diff] case mismatch in snippet view article find links to article
Invalidation for Switched Affine Systems with Applications to Fault and Anomaly Detection**This work is supported in part by DARPA grant N66001-14-1-4045".
Zia Chishti (1,606 words) [view diff] exact match in snippet view article find links to article
identification of patterns within complex data, including medical image anomaly detection, hydrocarbon detection, consumer behavioral predication and fraud
Chile Ridge (4,011 words) [view diff] exact match in snippet view article find links to article
the bathymetry and magnetic profiles study, as well as the gravity anomaly detection. The Valdivia Fault Zone has caused the offset of the north and south
Dan Hendrycks (650 words) [view diff] case mismatch in snippet view article find links to article
Hendrycks, Dan; Mazeika, Mantas; Dietterich, Thomas (2019-01-28). "Deep Anomaly Detection with Outlier Exposure". International Conference on Learning Representations
Peiter Zatko (2,957 words) [view diff] case mismatch in snippet view article find links to article
at the Wayback Machine, Andy Greenberg, Forbes, November 29, 2010 "Anomaly Detection at Multiple Scales". 16 October 2011. Archived from the original on
Information Processing in Medical Imaging (1,631 words) [view diff] case mismatch in snippet view article find links to article
Philipp Seeböck, Sebastian Waldstein, Georg Langs: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery 2019
Incoming (1998 video game) (2,050 words) [view diff] case mismatch in snippet view article
construction of a base in the Arctic. Secret work is started on an "ADATA" (Anomaly Detection And Tracking Array) near Mount Kilimanjaro. The events of the game
Software-defined networking (6,131 words) [view diff] exact match in snippet view article find links to article
(2014). "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments". Computer Networks.
CT scan (15,952 words) [view diff] case mismatch in snippet view article find links to article
spectral CT". In Greenberg JA, Gehm ME, Neifeld MA, Ashok A (eds.). Anomaly Detection and Imaging with X-Rays (ADIX) III. p. 12. doi:10.1117/12.2309663
Dan Blumberg (817 words) [view diff] exact match in snippet view article find links to article
other applications such homeland security, rapid response, target and anomaly detection and situational awareness. Within these studies Blumberg has been
US Navy airships during World War II (1,751 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. Consolidated PBY Catalina aircraft had been searching
MEMS magnetic field sensor (2,291 words) [view diff] exact match in snippet view article find links to article
nT), better sensors are required. For the application of magnetic anomaly detection, sensors at different locations have to be used to cancel the spatial-correlated
Boeing P-8 Poseidon (11,640 words) [view diff] exact match in snippet view article find links to article
deleted the requirement for the P-8A to be equipped with magnetic anomaly detection (MAD) equipment as a weight reduction measure, improving endurance
Twitch Plays Pokémon (5,737 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 25 February 2014. A. Haque. "Unsupervised Context-Aware Anomaly Detection for Identifying Trolls in Streaming Data Archived 5 July 2022 at the
2004 Venezuelan recall referendum (4,925 words) [view diff] case mismatch in snippet view article find links to article
Science 26(4) Luis Raul Pericchi and David A Torres (2011), Quick Anomaly Detection by the Newcomb–Benford Law, with Applications to Electoral Processes
Gen Digital (7,918 words) [view diff] case mismatch in snippet view article find links to article
protect connected vehicles against zero-day attacks. The Symantec Anomaly Detection for Automotive is an IoT product for manufacturers and uses machine
Airship (15,928 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. PBY aircraft had been searching these waters but
Magnetic flux leakage (2,144 words) [view diff] exact match in snippet view article find links to article
States National Technical Information Center 1999 REMPEL, Raymond - Anomaly detection using Magnetic Flux Leakage ( MFL ) Technology - Presented at the
Automatic identification system (9,512 words) [view diff] exact match in snippet view article find links to article
for safety and optimisation of seafaring, namely traffic analysis, anomaly detection, route extraction and prediction, collision detection, path planning
Self-driving car (15,150 words) [view diff] case mismatch in snippet view article find links to article
Ali; Alsini, Raed (15 July 2022). "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry. 14 (7): 1450
Alfonso Farina (1,928 words) [view diff] case mismatch in snippet view article find links to article
of the state-of-the-art Covariance-based Methods for Statistical Anomaly Detection Algorithms". Signal, Image and Video Processing. 10 (4): 687–694.
Government by algorithm (7,659 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, and
Government by algorithm (7,659 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, and
U.S. Carrier Group tactics (3,581 words) [view diff] exact match in snippet view article find links to article
miles (60 to 90 km) out are most common. If the air unit has magnetic anomaly detection (MAD) as well as sonobuoys then so much the better. Local ASW is within
VP-44 (1951–1991) (2,181 words) [view diff] exact match in snippet view article
power and endurance, the new aircraft were supplied with magnetic anomaly detection (MAD) gear to round out the electronic capabilities of the squadron
Geophysical MASINT (9,500 words) [view diff] case mismatch in snippet view article find links to article
promise, but these sensors must be fairly close to the target. Magnetic Anomaly Detection (MAD) is used in antisubmarine warfare, for final localization before
Internet fraud prevention (3,336 words) [view diff] exact match in snippet view article find links to article
techniques, including machine-learning-based behavior analytics and anomaly detection; the use of a "fraud hub" that enables third-party data sources to
Yuval Elovici (2,670 words) [view diff] exact match in snippet view article find links to article
devices based on various techniques, such as temporal reasoning and anomaly detection. In addition, an efficient, collaborative application-monitoring scheme
Data valuation (2,652 words) [view diff] exact match in snippet view article find links to article
PMID 36380246. Lee , W; Xiang, D (2001). "Information-theoretic measures for anomaly detection". Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
List of ProCurve products (1,964 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on Module
List of Primeval characters (20,570 words) [view diff] case mismatch in snippet view article find links to article
The anomaly that Christine has is normally cloaked from the ARC's Anomaly Detection Device (presumably by radio jamming on the frequency used by the detector)
List of HPE Networking products (3,060 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on Module
Cellular neural network (10,029 words) [view diff] exact match in snippet view article find links to article
infrared imagery, calorimeter cluster peak for high energy physics, anomaly detection in potential field maps for geophysics, laser dot detection, metal
Nitesh Chawla (1,603 words) [view diff] exact match in snippet view article find links to article
Chawla, N. V. (2019, July). A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings of
USS Davis (DD-937) (12,990 words) [view diff] case mismatch in snippet view article
controllers on board Davis and Fred T. Berry conducted over 1,200 Magnetic Anomaly Detection verification runs on the submarine, utilizing aircraft from Essex
RAF Coastal Command during World War II (16,558 words) [view diff] case mismatch in snippet view article find links to article
judgement by direct sighting with considerable success. Magnetic Anomaly Detection (MAD) was used to detect submerged U-boats. It consisted of a sensitive
David McCarthy (academic) (2,844 words) [view diff] exact match in snippet view article
loggers and sensors. They developed new sensors, loggers, and AI anomaly detection algorithms and applied them to a smart sensor array that could detect