2018
DOI: 10.1080/1206212x.2018.1521895
|View full text |Cite
|
Sign up to set email alerts
|

Swarm intelligence in anomaly detection systems: an overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(20 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…Also the accuracy could be further improved by selecting other features like texture and color. Finally, other methods such as data mining and artificial intelligence methods [20] could also be tested to see if they are effective in detecting and classifying burn wounds in future studies.…”
Section: Resultsmentioning
confidence: 99%
“…Also the accuracy could be further improved by selecting other features like texture and color. Finally, other methods such as data mining and artificial intelligence methods [20] could also be tested to see if they are effective in detecting and classifying burn wounds in future studies.…”
Section: Resultsmentioning
confidence: 99%
“…As an example, the first paper of this group is a survey in which summarizes the security issues esp. anomaly detecting and possible presented countermeasures and their pros and cons [5]. They describe the different swarm-based anomaly detection methods and provide new architecture.…”
Section: Performance Improvements/of Applicationsmentioning
confidence: 99%
“…Therefore, it is important to reduce the amount of resource overhead in order to minimize energy consumption in resource-constrained mobile devices. Finally, how to design an optimized LPPM that satisfies the service quality and resource overhead according to user privacy requirements and given attack model is significantly important research direction for location privacy [77].…”
Section: Privacy Protection Challenges and Comparison Analysismentioning
confidence: 99%