-
1
Detecting clusters in spatially repetitive point event data sets
Published 2007-07-01Get full text
Article -
2
-
3
Adaptive Fault Detection for Complex Dynamic Processes Based on JIT Updated Data Set
Published 2012-01-01“…Mahalanobis distance, representing the correlation among samples, is used to simplify and update the raw data set, which is the first merit in this paper. …”
Get full text
Article -
4
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
Published 2016-06-01“…Practical Experiments showed the process to achieve a high rate of detection in the system designer using data NSL-KDD with 12 field without vulnerability to change the radius of the detector or change the number of reagents were obtained as the ratio between detection (0.984, 0.998, 0.999) and the ratio between a false alarm (0.003, 0.002, 0.001). …”
Get full text
Article -
5
-
6
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
Published 2022-01-01“…In this paper, we propose a Protocol Based Deep Intrusion Detection (PB-DID) architecture, in which we created a data-set of packets from IoT traffic by comparing features from the UNSWNB15 and Bot-IoT data-sets based on flow and Transmission Control Protocol (TCP). …”
Get full text
Article -
7
An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set
Published 2025-01-01Get full text
Article -
8
Uncovering the impact of outliers on clusters’ evolution in temporal data-sets: an empirical analysis
Published 2024-12-01Get full text
Article -
9
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01Subjects: Get full text
Article -
10
Impact of Data Distribution and Bootstrap Setting on Anomaly Detection Using Isolation Forest in Process Quality Control
Published 2025-07-01“…This study investigates the impact of data distribution and bootstrap resampling on the anomaly detection performance of the Isolation Forest (iForest) algorithm in statistical process control. …”
Get full text
Article -
11
Towards a minimum universal features set for IoT DDoS attack detection
Published 2025-04-01Get full text
Article -
12
Investigating Offensive Language Detection in a Low-Resource Setting with a Robustness Perspective
Published 2024-11-01Get full text
Article -
13
Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents
Published 2024-01-01Subjects: Get full text
Article -
14
Deep Learning for Anomaly Detection in CNC Machine Vibration Data: A RoughLSTM-Based Approach
Published 2025-03-01“…This study proposes rough long short-term memory (RoughLSTM), a novel hybrid model integrating rough set theory (RST) with LSTM to enhance anomaly detection in CNC machine vibration data. …”
Get full text
Article -
15
Structural investigations of Yuli Geothermal field in Nigeria using gravity and magnetic data-set
Published 2025-12-01Get full text
Article -
16
On Flood Detection Using Dual-Polarimetric SAR Observation
Published 2025-06-01Get full text
Article -
17
Synthetic Dataset Generation Method for Object Detection
Published 2025-04-01Subjects: Get full text
Article -
18
Class-consistent technology-based outlier detection for incomplete real-valued data based on rough set theory and granular computing
Published 2025-05-01“…This article studies outlier detection for incomplete real-valued data based on class-consistent technology, rough set theory, and granular computing. …”
Get full text
Article -
19
-
20