2014 IEEE International Conference on Software Science, Technology and Engineering 2014
DOI: 10.1109/swste.2014.15
|View full text |Cite
|
Sign up to set email alerts
|

Reputation Prediction of Anomaly Detection Algorithms for Reliable System

Abstract: Today, sensors and/or anomaly detection algorithms (ADAs) are used to collect data in a wide variety of applications(e.g. Cyber security systems, sensor networks, etc.). Today, every sensor or ADA in its applied system participates in the collection of data throughout the entire system. The data collected from all of the sensors or ADAs are then integrated into one significant conclusion or decision, a process known as data fusion. However, the reliability, or reputation, of a single sensor or ADA may change o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…• Clustering: This technique groups transactions based on their similarities, potentially uncovering clusters deviating from normal user behavior, like a sudden surge of transactions from a specific location [4]. • Anomaly detection: [24] Algorithms spotlight data points significantly deviating from established patterns, potentially signaling fraudulent activity [5].…”
Section: Unveiling Insights Through Unsupervised Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…• Clustering: This technique groups transactions based on their similarities, potentially uncovering clusters deviating from normal user behavior, like a sudden surge of transactions from a specific location [4]. • Anomaly detection: [24] Algorithms spotlight data points significantly deviating from established patterns, potentially signaling fraudulent activity [5].…”
Section: Unveiling Insights Through Unsupervised Learningmentioning
confidence: 99%
“…Theoretical Framework: Guiding Our Pursuit Guiding our research is the "Anomaly Detection [24]" framework, which posits that fraudulent transactions deviate significantly from the normal patterns of legitimate activity. By understanding these patterns and identifying deviations, we can effectively pinpoint potentially fraudulent cases.…”
Section: Deployment and Monitoringmentioning
confidence: 99%