Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (2)
- Electrical and Computer Engineering (2)
- Systems Science (2)
- Applied Statistics (1)
- Business (1)
-
- Data Science (1)
- Digital Communications and Networking (1)
- Information Security (1)
- Management Information Systems (1)
- Numerical Analysis and Scientific Computing (1)
- OS and Networks (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Risk Analysis (1)
- Statistical Models (1)
- Statistics and Probability (1)
- Systems Architecture (1)
- Technology and Innovation (1)
- Theory and Algorithms (1)
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Learning And Analysis Of Dynamic Models For Grid Discrete Events Based On Log Information, Danlong Zhu, Yunqi Yan, Ying Chen, Jiaqi Zhang, Longxing Jin, Wei Fu
Learning And Analysis Of Dynamic Models For Grid Discrete Events Based On Log Information, Danlong Zhu, Yunqi Yan, Ying Chen, Jiaqi Zhang, Longxing Jin, Wei Fu
Journal of System Simulation
Abstract: With the increasing scale of power grid, the massive amount of log information generated bydevices in the power grid poses a challenge to the manual analysis of abnormal grid conditions. The log information generated during the operation of the power grid has the typical discrete sequential characteristics. By analyzing the log information of grid alarm messages, a station event transition probability model and an event sequence risk calculation method are proposed to effectively model and analyze the abnormal operation level of primary and secondary systems in substations. The proposed method not only successfully identifies the event sequences corresponding to …
Transforming Temporal-Dynamic Graphs Into Time-Series Data For Solving Event Detection Problems, Kutay Taşci, Fuat Akal
Transforming Temporal-Dynamic Graphs Into Time-Series Data For Solving Event Detection Problems, Kutay Taşci, Fuat Akal
Turkish Journal of Electrical Engineering and Computer Sciences
Event detection on temporal-dynamic graphs aims at detecting significant events based on deviations from the normal behavior of the graphs. With the widespread use of social media, many real-world events manifest as social media interactions, making them suitable for modeling as temporal-dynamic graphs. This paper presents a workflow for event detection on temporal-dynamic graphs using graph representation learning. Our workflow leverages generated embeddings of a temporal-dynamic graph to reframe the problem as an unsupervised time-series anomaly detection task. We evaluated our workflow on four distinct real-world social media datasets and compared our results with the related work. The results show …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Variational Autoencoder-Based Anomaly Detection In Time Series Data For Inventory Record Inaccuracy, Hali̇l Arğun, Sadetti̇n Emre Alpteki̇n
Variational Autoencoder-Based Anomaly Detection In Time Series Data For Inventory Record Inaccuracy, Hali̇l Arğun, Sadetti̇n Emre Alpteki̇n
Turkish Journal of Electrical Engineering and Computer Sciences
Retail companies monitor inventory stock levels regularly and manage them based on forecasted sales to sustain their market position. Inventory accuracy, defined as the difference between the warehouse stock records and the actual inventory, is critical for preventing stockouts and shortages. The root causes of inventory inaccuracy are the employee or customer theft, product damage or spoilage, and wrong shipments. In this paper, we aim at detecting inaccurate stocks of one of Turkey's largest supermarket chain using the variational autoencoder (VAE), which is an unsupervised learning method. Based on the findings, we showed that VAE is able to model the …
Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams
Anomaly Detection In Multi-Seasonal Time Series Data, Ashton Taylor Williams
Browse all Theses and Dissertations
Most of today’s time series data contain anomalies and multiple seasonalities, and accurate anomaly detection in these data is critical to almost any type of business. However, most mainstream forecasting models used for anomaly detection can only incorporate one or no seasonal component into their forecasts and cannot capture every known seasonal pattern in time series data. In this thesis, we propose a new multi-seasonal forecasting model for anomaly detection in time series data that extends the popular Seasonal Autoregressive Integrated Moving Average (SARIMA) model. Our model, named multi-SARIMA, utilizes a time series dataset’s multiple pre-determined seasonal trends to increase …
A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham
A Secure And Efficient Iiot Anomaly Detection Approach Using A Hybrid Deep Learning Technique, Bharath Reedy Konatham
Browse all Theses and Dissertations
The Industrial Internet of Things (IIoT) refers to a set of smart devices, i.e., actuators, detectors, smart sensors, and autonomous systems connected throughout the Internet to help achieve the purpose of various industrial applications. Unfortunately, IIoT applications are increasingly integrated into insecure physical environments leading to greater exposure to new cyber and physical system attacks. In the current IIoT security realm, effective anomaly detection is crucial for ensuring the integrity and reliability of critical infrastructure. Traditional security solutions may not apply to IIoT due to new dimensions, including extreme energy constraints in IIoT devices. Deep learning (DL) techniques like Convolutional …