Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (98)
  • Open Access

    ARTICLE

    Arrhythmia and Disease Classification Based on Deep Learning Techniques

    Ramya G. Franklin1,*, B. Muthukumar2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 835-851, 2022, DOI:10.32604/iasc.2022.019877

    Abstract Electrocardiography (ECG) is a method for monitoring the human heart’s electrical activity. ECG signal is often used by clinical experts in the collected time arrangement for the evaluation of any rhythmic circumstances of a topic. The research was carried to make the assignment computerized by displaying the problem with encoder-decoder methods, by using misfortune appropriation to predict standard or anomalous information. The two Convolutional Neural Networks (CNNs) and the Long Short-Term Memory (LSTM) fully connected layer (FCL) have shown improved levels over deep learning networks (DLNs) across a wide range of applications such as speech recognition, prediction etc., As CNNs… More >

  • Open Access

    ARTICLE

    Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

    Nazarii Lutsiv1, Taras Maksymyuk1,*, Mykola Beshley1, Orest Lavriv1, Volodymyr Andrushchak1, Anatoliy Sachenko2, Liberios Vokorokos3, Juraj Gazda3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 413-431, 2022, DOI:10.32604/cmc.2022.018773

    Abstract The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels. With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks. In this paper, we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous information systems. The proposed approach… More >

  • Open Access

    ARTICLE

    Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems

    Jianming Zhao1,2,3,4, Peng Zeng1,2,3,4,*, Chunyu Chen1,2,3,4, Zhiwei Dong5, Jongho Han6

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 337-350, 2021, DOI:10.32604/iasc.2021.016966

    Abstract As networked control systems continue to be widely used in large-scale industrial productions, industrial cyber-attacks have become an inevitable problem that can cause serious damage to critical infrastructures. In practice, industrial intrusion detection has been widely acknowledged to detect abnormal communication behaviors. However, unlike traditional IT systems, networked control systems have their own communication characteristics due to specific industrial communication protocols. Thus, simple cyber-attack modeling is inadequate and impractical for high-efficiency intrusion detection because the characteristics of network control systems are less considered. Based on the status information and transmission connection in industrial communication data payloads, which can properly express… More >

  • Open Access

    ARTICLE

    Multi-Layer Reconstruction Errors Autoencoding and Density Estimate for Network Anomaly Detection

    Ruikun Li1,*, Yun Li2, Wen He1,3, Lirong Chen1, Jianchao Luo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 381-398, 2021, DOI:10.32604/cmes.2021.016264

    Abstract Anomaly detection is an important method for intrusion detection. In recent years, unsupervised methods have been widely researched because they do not require labeling. For example, a nonlinear autoencoder can use reconstruction errors to attain the discrimination threshold. This method is not effective when the model complexity is high or the data contains noise. The method for detecting the density of compressed features in a hidden layer can be used to reduce the influence of noise on the selection of the threshold because the density of abnormal data in hidden layers is smaller than normal data. However, compressed features may… More >

  • Open Access

    ARTICLE

    Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain

    Xiajiong Shen1,3, Shuaimin Jiang2,3, Lei Zhang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1069-1085, 2021, DOI:10.32604/cmes.2021.015736

    Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More >

  • Open Access

    ARTICLE

    An Adaptive Anomaly Detection Algorithm Based on CFSFDP

    Weiwu Ren1,*, Xiaoqiang Di1, Zhanwei Du2, Jianping Zhao1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2057-2073, 2021, DOI:10.32604/cmc.2021.016678

    Abstract CFSFDP (Clustering by fast search and find of density peak) is a simple and crisp density clustering algorithm. It does not only have the advantages of density clustering algorithm, but also can find the peak of cluster automatically. However, the lack of adaptability makes it difficult to apply in intrusion detection. The new input cannot be updated in time to the existing profiles, and rebuilding profiles would waste a lot of time and computation. Therefore, an adaptive anomaly detection algorithm based on CFSFDP is proposed in this paper. By analyzing the influence of new input on center, edge and discrete… More >

  • Open Access

    ARTICLE

    An Anomaly Detection Method of Industrial Data Based on Stacking Integration

    Kunkun Wang1,2, Xianda Liu2,3,4,*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 9-19, 2021, DOI:10.32604/jai.2021.016706

    Abstract With the development of Internet technology, the computing power of data has increased, and the development of machine learning has become faster and faster. In the industrial production of industrial control systems, quality inspection and safety production of process products have always been our concern. Aiming at the low accuracy of anomaly detection in process data in industrial control system, this paper proposes an anomaly detection method based on stacking integration using the machine learning algorithm. Data are collected from the industrial site and processed by feature engineering. Principal component analysis (PCA) and integrated rule tree method are adopted to… More >

  • Open Access

    ARTICLE

    Traffic Anomaly Detection Method Based on Improved GRU and EFMS-Kmeans Clustering

    Yonghua Huo1, Yi Cao2, Zhihao Wang1, Yu Yan3, Zhongdi Ge3, Yang Yang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1053-1091, 2021, DOI:10.32604/cmes.2021.013045

    Abstract In recent years, with the continuous development of information technology and the rapid growth of network scale, network monitoring and management become more and more important. Network traffic is an important part of network state. In order to ensure the normal operation of the network, improve the availability of the network, find network faults in time and deal with network attacks; it is necessary to detect the abnormal traffic in the network. Abnormal traffic detection is of great significance in the actual network management. Therefore, in order to improve the accuracy and efficiency of network traffic anomaly detection, this paper… More >

  • Open Access

    ARTICLE

    Anomaly Detection in ICS Datasets with Machine Learning Algorithms

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Farah Diyana Abdul Rahman, Mohammad Tahir2

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 33-46, 2021, DOI:10.32604/csse.2021.014384

    Abstract An Intrusion Detection System (IDS) provides a front-line defense mechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week. A well-known ICS is the Supervisory Control and Data Acquisition (SCADA) system. It supervises the physical process from sensor data and performs remote monitoring control and diagnostic functions in critical infrastructures. The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as… More >

  • Open Access

    ARTICLE

    A Generative Adversarial Networks for Log Anomaly Detection

    Xiaoyu Duan1, Shi Ying1,*, Wanli Yuan1, Hailong Cheng1, Xiang Yin2

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 135-148, 2021, DOI:10.32604/csse.2021.014030

    Abstract Detecting anomaly logs is a great significance step for guarding system faults. Due to the uncertainty of abnormal log types, lack of real anomaly logs and accurately labeled log datasets. Existing technologies cannot be enough for detecting complex and various log point anomalies by using human-defined rules. We propose a log anomaly detection method based on Generative Adversarial Networks (GAN). This method uses the Encoder-Decoder framework based on Long Short-Term Memory (LSTM) network as the generator, takes the log keywords as the input of the encoder, and the decoder outputs the generated log template. The discriminator uses the Convolutional Neural… More >

Displaying 71-80 on page 8 of 98. Per Page