language:
Find link is a tool written by Edward Betts.Longer titles found: Anomaly Detection at Multiple Scales (view), Network behavior anomaly detection (view)
searching for Anomaly detection 134 found (376 total)
alternate case: anomaly detection
Magnetic anomaly detector
(790 words)
[view diff]
case mismatch in snippet
view article
find links to article
Wang, Siwei; Chen, Dixiang; Hu, Jingtao; Pan, Xue (2019). "Magnetic Anomaly Detection Based on Full Connected Neural Network". IEEE Access. 7. IEEE: 182198Global Maritime Situational Awareness (463 words) [view diff] exact match in snippet view article find links to article
"Maritime anomaly detection" returns a large number of hits from a wide range of domains. Some of the related topics are: Maritime anomaly detection and situationML.NET (1,625 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approachesAnti-submarine weapon (3,957 words) [view diff] case mismatch in snippet view article find links to article
anti-submarine forces also began employing autogyro aircraft and Magnetic Anomaly Detection (MAD) equipment to sink U.S. subs, particularly those plying majorAnomaly-based intrusion detection system (557 words) [view diff] exact match in snippet view article find links to article
recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviorsTracing (software) (1,312 words) [view diff] exact match in snippet view article
fall into a terminological gray area. Tracing is primarily used for anomaly detection, fault analysis, debugging or diagnostic purposes in distributed softwareAnodot (725 words) [view diff] exact match in snippet view article find links to article
learning and artificial intelligence for business monitoring and anomaly detection. Anodot was founded in 2014 by David Drai along with Ira Cohen, formerNetQoS (308 words) [view diff] case mismatch in snippet view article find links to article
company was acquired by CA Technologies include: Performance Center Anomaly Detection Network latency calculator Earlier offerings include: SuperAgent aMark Burgess (computer scientist) (2,268 words) [view diff] exact match in snippet view article
the proof of concept platform using these methods for system state anomaly detection, from 2002 to the present, and received widespread use. Based on theseAutomated X-ray inspection (1,386 words) [view diff] exact match in snippet view article find links to article
of the inspection are used to optimize following processing steps, Anomaly detection, i.e. the result of the inspection serve as a criterion to rejectComparison of cognitive architectures (143 words) [view diff] exact match in snippet view article find links to article
Hierarchical Temporal Memory connectionist online learning, anomaly detection ? anomaly detection active 2009 Hawkins et al (multiple) AGPL LIDA symbolicArgus – Audit Record Generation and Utilization System (829 words) [view diff] case mismatch in snippet view article find links to article
traffic measurement data for network forensics and Network Behavior Anomaly Detection (NBAD). Argus has been used extensively in cybersecurity, end-to-endRebecca Bace (944 words) [view diff] case mismatch in snippet view article find links to article
National Security Agency where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computerRoboNet (472 words) [view diff] exact match in snippet view article find links to article
2008, RoboNet-II has been using the expert system for microlensing anomaly detection that is being provided by the Automated Robotic Terrestrial ExoplanetMedoid (4,019 words) [view diff] exact match in snippet view article find links to article
identifying anomalies, and one efficient method is through cluster-based anomaly detection. They can be used to discover clusters of data points that deviateAnderson function (762 words) [view diff] exact match in snippet view article find links to article
along an arbitrary line. They are useful in the study of magnetic anomaly detection, with historical applications in submarine hunting and underwaterFlowmon Networks (631 words) [view diff] exact match in snippet view article find links to article
probes and collectors by analytical features for network behavior anomaly detection, network awareness application performance management, DDoS detectionJugal Kalita (186 words) [view diff] case mismatch in snippet view article find links to article
for Students and Professionals, 2003, Universal Publishers Network Anomaly Detection: A Machine Learning Perspective, with Dhruba K. Bhattacharyya, 2013Vir Phoha (787 words) [view diff] exact match in snippet view article find links to article
research focuses on attack-averse authentication, spoof-resistance, anomaly detection, machine learning, optimized attack formulation, and spatial-temporalDiffusion map (2,469 words) [view diff] exact match in snippet view article find links to article
speaker verification and identification, sampling on manifolds, anomaly detection, image inpainting, revealing brain resting state networks organizationDasient (406 words) [view diff] exact match in snippet view article find links to article
behavioral-based engine - based on sophisticated algorithms and anomaly detection technology - to defend against the latest attacks using up-to-dateAbiodun Musa Aibinu (898 words) [view diff] case mismatch in snippet view article find links to article
Matters. Performance Evaluation of You Only Look Once v4 in Road Anomaly Detection and Visual Simultaneous Localisation and Mapping for Autonomous VehiclesOpenText Data Protector (550 words) [view diff] case mismatch in snippet view article find links to article
additional security features like Multi-Factor Authentication and Anomaly Detection have been added. Today's version of Data Protector provides full backwardsHSM-49 (818 words) [view diff] case mismatch in snippet view article find links to article
advanced airborne active sonar. It is not equipped with the Magnetic Anomaly Detection (MAD) that the SH-60B employed. Pilot instrumentation is providedData lineage (6,167 words) [view diff] no match in snippet view article find links to article
Data lineage includes the data origin, what happens to it, and where it moves over time. Data lineage provides visibility and simplifies tracing errorsDhruba K. Bhattacharyya (345 words) [view diff] case mismatch in snippet view article find links to article
is the vice-chancellor (in-charge) of Tezpur University. Network Anomaly Detection: A Machine Learning Perspective, with Jugal K Kalita, 2013, CRC PressZeek (645 words) [view diff] exact match in snippet view article find links to article
another Zeek script. Zeek analyzers perform application layer decoding, anomaly detection, signature matching and connection analysis. Zeek's developers designedPrognostics (3,745 words) [view diff] exact match in snippet view article find links to article
configure and customize the algorithms for signature extraction, anomaly detection, health assessment, failure diagnosis, and failure prediction forElection forensics (742 words) [view diff] exact match in snippet view article find links to article
forensics: Using machine learning and synthetic data for possible election anomaly detection". PLOS ONE. 14 (10): e0223950. Bibcode:2019PLoSO..1423950Z. doi:10Security visualisation (511 words) [view diff] exact match in snippet view article find links to article
varying shades and patterns of color gradient. ELISHA is a visual anomaly detection system. The tool aims at identifying multiple origin autonomous systemWireless sensor network (6,401 words) [view diff] exact match in snippet view article find links to article
use. This technique has been used, for instance, for distributed anomaly detection or distributed optimization. As nodes can inspect the data they forwardDHS Border and Maritime Security Division (371 words) [view diff] exact match in snippet view article find links to article
examination by non-intrusive inspection Increased information fusion, anomaly detection, Automatic Target Recognition capability Detect and identify WMD materials3 Corner Satellite (452 words) [view diff] exact match in snippet view article find links to article
Execution and Replanning (CASPER) software, and Context-sensitive anomaly detection software (SELMON monitoring system) NASA Jet Propulsion LaboratoryK-class blimp (2,467 words) [view diff] exact match in snippet view article find links to article
had a detection range of 90 mi (140 km), sonobuoys, and magnetic anomaly detection (MAD) equipment. The K-ships carried four 350 lb (160 kg) depth bombsKenitra Air Base (772 words) [view diff] exact match in snippet view article find links to article
shallow waters of the Straits of Gibraltar where radar and magnetic anomaly detection were viable. Craw Field was the final destination of the six K-shipsLockheed P-3 Orion (11,318 words) [view diff] exact match in snippet view article find links to article
its distinctive tail stinger or "MAD" boom, used for the magnetic anomaly detection (MAD) of submarines. Over the years, the P-3 has seen numerous designList of weapons of the Japanese Navy (1,515 words) [view diff] exact match in snippet view article find links to article
Kawanishi E7K2 ("Alf") Mark 2: short range seaplane, fitted with magnetic anomaly detection equipment and surface-search radar for short range patrol and antisubmarineAirborne Real-time Cueing Hyperspectral Enhanced Reconnaissance (3,023 words) [view diff] exact match in snippet view article find links to article
matching where reflected light is matched to spectral signatures anomaly detection using a statistical model of the pixels in the image to determineOSSIM (842 words) [view diff] exact match in snippet view article find links to article
address anomaly detection, replaced by PRADS. P0f, used for passive OS detection and OS change analysis, replaced by PRADS. PADS, used for service anomaly detectionAllot (company) (1,274 words) [view diff] case mismatch in snippet view article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 146 million (2021) Total equity US$ 126 million (2021)Allot (company) (1,274 words) [view diff] case mismatch in snippet view article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 146 million (2021) Total equity US$ 126 million (2021)Dorothy E. Denning (2,197 words) [view diff] exact match in snippet view article find links to article
developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI'sNaval aircrewman (2,250 words) [view diff] exact match in snippet view article find links to article
electronic warfare, active and passive sonar. Reading sonograms, magnetic anomaly detection equipment, physics, wave propagation, oceanography, meteorology andEnglish Wikipedia (3,801 words) [view diff] exact match in snippet view article find links to article
S2CID 61150982. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011Real-time outbreak and disease surveillance (260 words) [view diff] case mismatch in snippet view article find links to article
Challenges Facing Early Outbreak Detection in Biosurveillance", Technometrics (Special Issue on Anomaly Detection), vol. 52, issue 1, pp. 39–51, 2010 v t ePacket capture appliance (1,943 words) [view diff] exact match in snippet view article find links to article
techniques for network intrusion detection, traffic classification, and anomaly detection are used to identify potentially malicious traffic for collectionAnti-submarine warfare (7,657 words) [view diff] exact match in snippet view article find links to article
surprise and attack enemy submarines on the surface at night. Magnetic anomaly detection Diesel exhaust sniffers Sonobuoys Weaponry Depth charges, the mostCall graph (1,566 words) [view diff] exact match in snippet view article find links to article
Dawn (25 October 2004). "Gray-box extraction of execution graphs for anomaly detection". Proceedings of the 11th ACM conference on Computer and communicationsDegaussing (2,757 words) [view diff] exact match in snippet view article find links to article
facilitate the detection of a submarine by ships or aircraft with magnetic anomaly detection (MAD) equipment. Navies use the deperming procedure, in conjunctionCFEngine (1,171 words) [view diff] exact match in snippet view article find links to article
re-write, CFEngine 2, which added features for machine learning, anomaly detection and secure communications. Between 1998 and 2004, CFEngine grew inMod qos (826 words) [view diff] exact match in snippet view article find links to article
upload/download throughput a client must generate. September 2009, Version 9: Anomaly detection using client characteristic measurement. February 2012, Version 10:Webroot (1,827 words) [view diff] exact match in snippet view article find links to article
of CyberFlow Analytics, a company applying data science to network anomaly detection. In February 2019 Webroot announced that it would be acquired by CarboniteMilitary helicopter (3,142 words) [view diff] exact match in snippet view article find links to article
King, to be equipped with integral dunking sonar, radar and magnetic anomaly detection equipment. The result was an aircraft able to more quickly respondWebist (1,815 words) [view diff] case mismatch in snippet view article find links to article
Antti Juvonen. "GROWING HIERARCHICAL SELF-ORGANISING MAPS FOR ONLINE ANOMALY DETECTION BY USING NETWORK LOGS" Proceedings - Proceedings of the 7th InternationalGoogle Analytics (3,682 words) [view diff] exact match in snippet view article find links to article
built-in DebugView to analyze and debug the upcoming data instantly, Anomaly detection, Improved e-commerce reports. Has feature to analysis user journeyNaval Station Argentia (2,422 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and PB4Y-2) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the StraitIoBT-CRA (698 words) [view diff] exact match in snippet view article find links to article
tasks such as information collection, predictive processing, and data anomaly detection. Security: Methods of increasing the defenses of IoBTs such that theThomas G. Dietterich (2,777 words) [view diff] case mismatch in snippet view article find links to article
Dietterich, Shubhomoy Das (2016). Finite Sample Complexity of Rare Pattern Anomaly Detection. Uncertainty in Artificial Intelligence (UAI-2016). New York, NY Alkaee-TaleghanSense Networks (807 words) [view diff] case mismatch in snippet view article find links to article
Spatial-Temporal Trails in Location Analytics (US 20100079336), and Anomaly Detection in Sensor Analytics (US 20100082301). The company was acquired byHoneytoken (469 words) [view diff] case mismatch in snippet view article find links to article
PMC 9185350. PMID 35684744. DLP and honeytokens IDS: RES: Protocol Anomaly Detection IDS – Honeypots Has my mailing list been stolen? | Plynt SecurityDouglas B-18 Bolo (3,099 words) [view diff] exact match in snippet view article find links to article
bombardier was replaced by a search radar with a large radome. Magnetic anomaly detection (MAD) equipment was sometimes housed in a tail boom. These aircraftNetMiner (803 words) [view diff] case mismatch in snippet view article find links to article
Two mode analysis modules and Mining(Classification, Regression, Anomaly Detection, Frequent Subgraph etc.) was added (Version: 4.2.0) MorphologicalHyper-surveillance (1,060 words) [view diff] exact match in snippet view article find links to article
Zhang, Y.; Li, M.; Dong, Z. Y.; Meng, K. (June 2019). "Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring". CSEESea anemone (4,558 words) [view diff] case mismatch in snippet view article find links to article
Bojani (2011). Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer Science & BusinessShared Whois Project (397 words) [view diff] case mismatch in snippet view article find links to article
Gleichmann; Doug Montgomery (2009). "A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms". 2009 Cybersecurity Applications & TechnologyElastic NV (695 words) [view diff] exact match in snippet view article find links to article
Elastic acquired Prelert, a machine learning company specializing in anomaly detection. Swiftype - In 2017, Elastic acquired Swiftype, a provider of searchGlassbox (1,231 words) [view diff] exact match in snippet view article find links to article
and churn prediction, real-time fraud detection and prevention, and anomaly detection systems, and they could help enterprise clients anticipate issuesThe Signpost (4,315 words) [view diff] exact match in snippet view article find links to article
2016. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011Breakthrough Listen (3,505 words) [view diff] case mismatch in snippet view article find links to article
Seung Woo Son; Andrew Siemion; Steve Croft (2019). "Self-Supervised Anomaly Detection for Narrowband SETI". arXiv:1901.04636 [astro-ph.IM]. "Open Data"Shaanxi Y-8 (3,110 words) [view diff] exact match in snippet view article find links to article
air-to-surface search radar, a side-looking ISAR radar and a magnetic anomaly detection tube. Y-8EW: New EW aircraft. Y-8 Gunship: A projected gunship versionKansas Geological Survey (1,994 words) [view diff] no match in snippet view article find links to article
to advance the research and development of an automated subterrain anomaly-detection system using active seismic-imaging (ASI) technologies to be usedSKYNET (surveillance program) (450 words) [view diff] exact match in snippet view article
statistical discrepancies with behavioral abnormalities and that the anomaly detection methodology SKYNET perpetuates the self/other binary. For exampleSocial media measurement (1,921 words) [view diff] exact match in snippet view article find links to article
S2CID 13987132. Wang, Wei (2011). "Network traffic monitoring, analysis and anomaly detection [Guest Editorial]". IEEE Network. 25 (3): 6–7. doi:10.1109/mnet.2011Turbomachinery (2,486 words) [view diff] case mismatch in snippet view article find links to article
Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application". International Joint ConferenceConcept drift (2,896 words) [view diff] exact match in snippet view article find links to article
Numenta Anomaly Benchmark, benchmark for evaluating algorithms for anomaly detection in streaming, real-time applications. (2014–2018) 2014 [] SpecialLastline (967 words) [view diff] case mismatch in snippet view article find links to article
Countermeasure (computer) IT risk Machine learning Malware Network Behavior Anomaly Detection Threat (computer) Yokwicz, Will Watching the (Digital) DetectivesThetaRay (1,035 words) [view diff] exact match in snippet view article find links to article
2016. "Transforming the way the world deals with data - intelligent anomaly detection by ThetaRay". The Silicon Review. Retrieved 2022-05-10. "ThetaRayPeter Tippett (1,139 words) [view diff] exact match in snippet view article find links to article
image signatures, using hash-tables for trusted file execution and anomaly detection, aspects of mail merge and "un-do." He ran a bulletin board systemCohesity (1,629 words) [view diff] exact match in snippet view article find links to article
provides anti-ransomware features including machine learning-based anomaly detection. Through the acquisition of Imanis Data in 2019, Cohesity extendedWei Wang (computer scientist) (721 words) [view diff] case mismatch in snippet view article
pp. 197–206, 2018. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks, by Wenchao Yu, Wei Cheng, Charu Aggarwal, KaiBattery electric vehicle (4,779 words) [view diff] exact match in snippet view article find links to article
management, the controller performs various safety checks such as anomaly detection, functional safety tests and failure diagnostics. Most electric vehiclesList of spatial analysis software (98 words) [view diff] exact match in snippet view article find links to article
geo-triggered events, dynamic and complex route calculations and automated anomaly detection are just a mouse click away. Independent benchmark tests by academiaHMS Wishart (2,909 words) [view diff] exact match in snippet view article find links to article
Navy PBY Catalina aircraft of Patrol Squadron 63 using magnetic anomaly detection equipment detected the German submarine U-761 near Tangier while U-761Portugal during World War II (5,575 words) [view diff] exact match in snippet view article find links to article
of German U-boats around the Straits of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from WeeksvilleKrishnendu Chakrabarty (795 words) [view diff] case mismatch in snippet view article find links to article
for his paper "Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques." He also received the 2021 Vitold Belevitch Award forCyber Assessment Framework (307 words) [view diff] exact match in snippet view article find links to article
Objective C: Detecting cyber security events C.1 Security monitoring C.2 Anomaly detection Objective D: Minimising the impact of cyber security incidents D.1Netdata (1,170 words) [view diff] case mismatch in snippet view article find links to article
second and displayed instantly on intuitive dashboards. Unsupervised Anomaly Detection Utilizes machine learning to detect anomalies in given metrics, enablingNaval Air Station South Weymouth (3,555 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and B-24s) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the StraitsPrimeval: New World (2,351 words) [view diff] exact match in snippet view article find links to article
his cooperation on the anomalies, but is rebuffed. Toby creates an anomaly detection system by hacking the local cell phone network, and immediately detectsVishal Monga (773 words) [view diff] case mismatch in snippet view article find links to article
in Color Image Processing: Methods and Applications (2006) "Video Anomaly Detection" in Computer Vision and Imaging in Intelligent Transportation SystemsNeptune Mission (811 words) [view diff] exact match in snippet view article find links to article
Neptune aircraft. The advent of airborne radar, sonar and magnetic anomaly detection (MAD)-equipped aircraft such as the Neptune, made for a potent counterUnderwater searches (10,541 words) [view diff] exact match in snippet view article find links to article
ships. Air searches can be done for magnetic targets using magnetic anomaly detection (MAD) systems, which use a sensitive magnetometer carried by an aircraftLajes Field (4,101 words) [view diff] exact match in snippet view article find links to article
for German U-boats around the Strait of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from WeeksvilleIBM System Management Facilities (1,355 words) [view diff] exact match in snippet view article find links to article
log-based and metric-based machine learning technology to provide anomaly detection. IBM Db2 Analytics Accelerator for z/OS, a database application thatSmall Satellite Research Laboratory (1,177 words) [view diff] exact match in snippet view article find links to article
from motion, surface reconstruction, data compression, and oceanic anomaly detection. UGA Small Satellite Research Laboratory Team and History [1] FacultyVP-5 (4,904 words) [view diff] exact match in snippet view article find links to article
1948 VP-ML-5 received the first P2V Neptune, equipped with magnetic anomaly detection (MAD) equipment capable of detecting large magnetic objects underwaterCheating in online games (5,957 words) [view diff] no match in snippet view article find links to article
On online games, cheating subverts the rules or mechanics of the games to gain an unfair advantage over other players, generally with the use of third-partyFault detection and isolation (3,228 words) [view diff] case mismatch in snippet view article find links to article
Invalidation for Switched Affine Systems with Applications to Fault and Anomaly Detection**This work is supported in part by DARPA grant N66001-14-1-4045".Zia Chishti (1,606 words) [view diff] exact match in snippet view article find links to article
identification of patterns within complex data, including medical image anomaly detection, hydrocarbon detection, consumer behavioral predication and fraudChile Ridge (4,011 words) [view diff] exact match in snippet view article find links to article
the bathymetry and magnetic profiles study, as well as the gravity anomaly detection. The Valdivia Fault Zone has caused the offset of the north and southDan Hendrycks (650 words) [view diff] case mismatch in snippet view article find links to article
Hendrycks, Dan; Mazeika, Mantas; Dietterich, Thomas (2019-01-28). "Deep Anomaly Detection with Outlier Exposure". International Conference on Learning RepresentationsPeiter Zatko (2,957 words) [view diff] case mismatch in snippet view article find links to article
at the Wayback Machine, Andy Greenberg, Forbes, November 29, 2010 "Anomaly Detection at Multiple Scales". 16 October 2011. Archived from the original onInformation Processing in Medical Imaging (1,631 words) [view diff] case mismatch in snippet view article find links to article
Philipp Seeböck, Sebastian Waldstein, Georg Langs: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery 2019Incoming (1998 video game) (2,050 words) [view diff] case mismatch in snippet view article
construction of a base in the Arctic. Secret work is started on an "ADATA" (Anomaly Detection And Tracking Array) near Mount Kilimanjaro. The events of the gameSoftware-defined networking (6,131 words) [view diff] exact match in snippet view article find links to article
(2014). "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments". Computer Networks.CT scan (15,952 words) [view diff] case mismatch in snippet view article find links to article
spectral CT". In Greenberg JA, Gehm ME, Neifeld MA, Ashok A (eds.). Anomaly Detection and Imaging with X-Rays (ADIX) III. p. 12. doi:10.1117/12.2309663Dan Blumberg (817 words) [view diff] exact match in snippet view article find links to article
other applications such homeland security, rapid response, target and anomaly detection and situational awareness. Within these studies Blumberg has beenUS Navy airships during World War II (1,751 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. Consolidated PBY Catalina aircraft had been searchingMEMS magnetic field sensor (2,291 words) [view diff] exact match in snippet view article find links to article
nT), better sensors are required. For the application of magnetic anomaly detection, sensors at different locations have to be used to cancel the spatial-correlatedBoeing P-8 Poseidon (11,640 words) [view diff] exact match in snippet view article find links to article
deleted the requirement for the P-8A to be equipped with magnetic anomaly detection (MAD) equipment as a weight reduction measure, improving enduranceTwitch Plays Pokémon (5,737 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 25 February 2014. A. Haque. "Unsupervised Context-Aware Anomaly Detection for Identifying Trolls in Streaming Data Archived 5 July 2022 at the2004 Venezuelan recall referendum (4,925 words) [view diff] case mismatch in snippet view article find links to article
Science 26(4) Luis Raul Pericchi and David A Torres (2011), Quick Anomaly Detection by the Newcomb–Benford Law, with Applications to Electoral ProcessesGen Digital (7,918 words) [view diff] case mismatch in snippet view article find links to article
protect connected vehicles against zero-day attacks. The Symantec Anomaly Detection for Automotive is an IoT product for manufacturers and uses machineAirship (15,928 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. PBY aircraft had been searching these waters butMagnetic flux leakage (2,144 words) [view diff] exact match in snippet view article find links to article
States National Technical Information Center 1999 REMPEL, Raymond - Anomaly detection using Magnetic Flux Leakage ( MFL ) Technology - Presented at theAutomatic identification system (9,512 words) [view diff] exact match in snippet view article find links to article
for safety and optimisation of seafaring, namely traffic analysis, anomaly detection, route extraction and prediction, collision detection, path planningSelf-driving car (15,150 words) [view diff] case mismatch in snippet view article find links to article
Ali; Alsini, Raed (15 July 2022). "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry. 14 (7): 1450Alfonso Farina (1,928 words) [view diff] case mismatch in snippet view article find links to article
of the state-of-the-art Covariance-based Methods for Statistical Anomaly Detection Algorithms". Signal, Image and Video Processing. 10 (4): 687–694.Government by algorithm (7,659 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, andGovernment by algorithm (7,659 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, andU.S. Carrier Group tactics (3,581 words) [view diff] exact match in snippet view article find links to article
miles (60 to 90 km) out are most common. If the air unit has magnetic anomaly detection (MAD) as well as sonobuoys then so much the better. Local ASW is withinVP-44 (1951–1991) (2,181 words) [view diff] exact match in snippet view article
power and endurance, the new aircraft were supplied with magnetic anomaly detection (MAD) gear to round out the electronic capabilities of the squadronGeophysical MASINT (9,500 words) [view diff] case mismatch in snippet view article find links to article
promise, but these sensors must be fairly close to the target. Magnetic Anomaly Detection (MAD) is used in antisubmarine warfare, for final localization beforeInternet fraud prevention (3,336 words) [view diff] exact match in snippet view article find links to article
techniques, including machine-learning-based behavior analytics and anomaly detection; the use of a "fraud hub" that enables third-party data sources toYuval Elovici (2,670 words) [view diff] exact match in snippet view article find links to article
devices based on various techniques, such as temporal reasoning and anomaly detection. In addition, an efficient, collaborative application-monitoring schemeData valuation (2,652 words) [view diff] exact match in snippet view article find links to article
PMID 36380246. Lee , W; Xiang, D (2001). "Information-theoretic measures for anomaly detection". Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001List of ProCurve products (1,964 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on ModuleList of Primeval characters (20,570 words) [view diff] case mismatch in snippet view article find links to article
The anomaly that Christine has is normally cloaked from the ARC's Anomaly Detection Device (presumably by radio jamming on the frequency used by the detector)List of HPE Networking products (3,060 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on ModuleCellular neural network (10,029 words) [view diff] exact match in snippet view article find links to article
infrared imagery, calorimeter cluster peak for high energy physics, anomaly detection in potential field maps for geophysics, laser dot detection, metalNitesh Chawla (1,603 words) [view diff] exact match in snippet view article find links to article
Chawla, N. V. (2019, July). A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings ofUSS Davis (DD-937) (12,990 words) [view diff] case mismatch in snippet view article
controllers on board Davis and Fred T. Berry conducted over 1,200 Magnetic Anomaly Detection verification runs on the submarine, utilizing aircraft from EssexRAF Coastal Command during World War II (16,558 words) [view diff] case mismatch in snippet view article find links to article
judgement by direct sighting with considerable success. Magnetic Anomaly Detection (MAD) was used to detect submerged U-boats. It consisted of a sensitiveDavid McCarthy (academic) (2,844 words) [view diff] exact match in snippet view article
loggers and sensors. They developed new sensors, loggers, and AI anomaly detection algorithms and applied them to a smart sensor array that could detect