2020
DOI: 10.1007/s12053-020-09884-2
|View full text |Cite
|
Sign up to set email alerts
|

A deep learning approach for anomaly detection and prediction in power consumption data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…In order to check the viability and the effectiveness of the proposed cumulative anomaly recognition method for security database based on discrete Markov chain, it is compared with three anomaly recognition methods in reference [3][4][5]. In this paper, the event log generated when the DARPA98 data set is replayed on the NT system is used as the experimental data for simulation experiment.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to check the viability and the effectiveness of the proposed cumulative anomaly recognition method for security database based on discrete Markov chain, it is compared with three anomaly recognition methods in reference [3][4][5]. In this paper, the event log generated when the DARPA98 data set is replayed on the NT system is used as the experimental data for simulation experiment.…”
Section: Resultsmentioning
confidence: 99%
“…Stealing of relevant information, duplication of records, denial of service, and the inability to get information on time are all issues that public entities face [4]. Cyber attackers are seeking a way in through a system breach and have a variety of tools for gaining access to an organization's systems or databases [5].…”
Section: Introductionmentioning
confidence: 99%
“…This stage often introduces blurriness in the processed images. [38]. Convolution shows the important relationship between pixels by learning features using small squares of input data.…”
Section: Methodsmentioning
confidence: 99%
“…e security performance requirements of the cloud data platform application in the communication process authentication were analyzed. e article designs the platform access framework based on fingerprint authentication by realizing the security of the multidomain access identity authentication in the cloud data platform [19,20]. And, for the fingerprint feature extraction of the platform fingerprint authentication module, it lays the foundation for connecting the cloud data platform and interdomain access, so as to realize the design of anonymous account encryption and decryption.…”
Section: Related Workmentioning
confidence: 99%