Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Optimization (2)
- Anomaly Detection (1)
- Computer engineering (1)
- Cyber-Physical Security (1)
- Deep Learning (1)
-
- Electrical and computer engineering (1)
- Game Theory (1)
- Information security (1)
- Location-based Services (1)
- Long Short Term Memory (1)
- Machine Learning (1)
- Mobile Sensing (1)
- Numerical analysis and scientific computing (1)
- Os and networks (1)
- Probabilistic Inference (1)
- Reliability (1)
- Resilience (1)
- Search Query (1)
- Sequential Data (1)
- Smart Grid (1)
- Software engineering (1)
- Statistics and probability (1)
- Theory and algorithms (1)
- User Privacy (1)
Articles 1 - 4 of 4
Full-Text Articles in Theory and Algorithms
Anomaly Detection In Sequential Data: A Deep Learning-Based Approach, Jayesh Soni
Anomaly Detection In Sequential Data: A Deep Learning-Based Approach, Jayesh Soni
FIU Electronic Theses and Dissertations
Anomaly Detection has been researched in various domains with several applications in intrusion detection, fraud detection, system health management, and bio-informatics. Conventional anomaly detection methods analyze each data instance independently (univariate or multivariate) and ignore the sequential characteristics of the data. Anomalies in the data can be detected by grouping the individual data instances into sequential data and hence conventional way of analyzing independent data instances cannot detect anomalies. Currently: (1) Deep learning-based algorithms are widely used for anomaly detection purposes. However, significant computational overhead time is incurred during the training process due to static constant batch size and learning …
Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi
Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi
FIU Electronic Theses and Dissertations
It has become a dominant trend in industry to adopt cloud computing --thanks to its unique advantages in flexibility, scalability, elasticity and cost efficiency -- for providing online cloud services over the Internet using large-scale data centers. In the meantime, the relentless increase in demand for affordable and high-quality cloud-based services, for individuals and businesses, has led to tremendously high power consumption and operating expense and thus has posed pressing challenges on cloud service providers in finding efficient resource allocation policies.
Allowing several services or Virtual Machines (VMs) to commonly share the cloud's infrastructure enables cloud providers to optimize resource …
Game-Theoretic And Machine-Learning Techniques For Cyber-Physical Security And Resilience In Smart Grid, Longfei Wei
Game-Theoretic And Machine-Learning Techniques For Cyber-Physical Security And Resilience In Smart Grid, Longfei Wei
FIU Electronic Theses and Dissertations
The smart grid is the next-generation electrical infrastructure utilizing Information and Communication Technologies (ICTs), whose architecture is evolving from a utility-centric structure to a distributed Cyber-Physical System (CPS) integrated with a large-scale of renewable energy resources. However, meeting reliability objectives in the smart grid becomes increasingly challenging owing to the high penetration of renewable resources and changing weather conditions. Moreover, the cyber-physical attack targeted at the smart grid has become a major threat because millions of electronic devices interconnected via communication networks expose unprecedented vulnerabilities, thereby increasing the potential attack surface. This dissertation is aimed at developing novel game-theoretic and …
User-Centric Privacy Preservation In Mobile And Location-Aware Applications, Mingming Guo
User-Centric Privacy Preservation In Mobile And Location-Aware Applications, Mingming Guo
FIU Electronic Theses and Dissertations
The mobile and wireless community has brought a significant growth of location-aware devices including smart phones, connected vehicles and IoT devices. The combination of location-aware sensing, data processing and wireless communication in these devices leads to the rapid development of mobile and location-aware applications. Meanwhile, user privacy is becoming an indispensable concern. These mobile and location-aware applications, which collect data from mobile sensors carried by users or vehicles, return valuable data collection services (e.g., health condition monitoring, traffic monitoring, and natural disaster forecasting) in real time. The sequential spatial-temporal data queries sent by users provide their location trajectory information. The …