language:
Find link is a tool written by Edward Betts.Longer titles found: Anomaly Detection at Multiple Scales (view), Network behavior anomaly detection (view)
searching for Anomaly detection 141 found (405 total)
alternate case: anomaly detection
Magnetic anomaly detector
(805 words)
[view diff]
case mismatch in snippet
view article
find links to article
Wang, Siwei; Chen, Dixiang; Hu, Jingtao; Pan, Xue (2019). "Magnetic Anomaly Detection Based on Full Connected Neural Network". IEEE Access. 7. IEEE: 182198Global Maritime Situational Awareness (463 words) [view diff] exact match in snippet view article find links to article
"Maritime anomaly detection" returns a large number of hits from a wide range of domains. Some of the related topics are: Maritime anomaly detection and situationAnomaly-based intrusion detection system (554 words) [view diff] exact match in snippet view article find links to article
recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviorsML.NET (1,604 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approachesAnti-submarine weapon (3,992 words) [view diff] case mismatch in snippet view article find links to article
anti-submarine forces also began employing autogyro aircraft and Magnetic Anomaly Detection (MAD) equipment to sink U.S. subs, particularly those plying majorNetQoS (308 words) [view diff] case mismatch in snippet view article find links to article
company was acquired by CA Technologies include: Performance Center Anomaly Detection Network latency calculator Earlier offerings include: SuperAgent aTracing (software) (1,313 words) [view diff] exact match in snippet view article
fall into a terminological gray area. Tracing is primarily used for anomaly detection, fault analysis, debugging or diagnostic purposes in distributed softwareMark Burgess (computer scientist) (2,269 words) [view diff] exact match in snippet view article
the proof of concept platform using these methods for system state anomaly detection, from 2002 to the present, and received widespread use. Based on theseAutomated X-ray inspection (1,388 words) [view diff] exact match in snippet view article find links to article
of the inspection are used to optimize following processing steps, Anomaly detection, i.e. the result of the inspection serve as a criterion to rejectComparison of cognitive architectures (150 words) [view diff] exact match in snippet view article find links to article
Hierarchical Temporal Memory connectionist online learning, anomaly detection ? anomaly detection Active 2009 Hawkins et al (multiple) AGPL LIDA symbolicRebecca Bace (934 words) [view diff] case mismatch in snippet view article find links to article
National Security Agency where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computerAnderson function (762 words) [view diff] exact match in snippet view article find links to article
along an arbitrary line. They are useful in the study of magnetic anomaly detection, with historical applications in submarine hunting and underwaterSematext (145 words) [view diff] exact match in snippet view article find links to article
on-premises systems for application performance monitoring, alerting, anomaly detection, centralized logging, logging management, analytics, and real userArgus – Audit Record Generation and Utilization System (919 words) [view diff] case mismatch in snippet view article find links to article
traffic measurement data for network forensics and Network Behavior Anomaly Detection (NBAD). Argus has been used extensively in cybersecurity, end-to-endFlowmon Networks (554 words) [view diff] exact match in snippet view article find links to article
probes and collectors by analytical features for network behavior anomaly detection, network awareness application performance management, DDoS detectionVir Phoha (787 words) [view diff] exact match in snippet view article find links to article
research focuses on attack-averse authentication, spoof-resistance, anomaly detection, machine learning, optimized attack formulation, and spatial-temporalMedoid (4,008 words) [view diff] exact match in snippet view article find links to article
identifying anomalies, and one efficient method is through cluster-based anomaly detection. They can be used to discover clusters of data points that deviateJugal Kalita (201 words) [view diff] case mismatch in snippet view article find links to article
for Students and Professionals, 2003, Universal Publishers Network Anomaly Detection: A Machine Learning Perspective, with Dhruba K. Bhattacharyya, 2013Diffusion map (2,482 words) [view diff] exact match in snippet view article find links to article
speaker verification and identification, sampling on manifolds, anomaly detection, image inpainting, revealing brain resting state networks organizationDasient (408 words) [view diff] exact match in snippet view article find links to article
behavioral-based engine - based on sophisticated algorithms and anomaly detection technology - to defend against the latest attacks using up-to-dateAbiodun Musa Aibinu (902 words) [view diff] case mismatch in snippet view article find links to article
Matters. Performance Evaluation of You Only Look Once v4 in Road Anomaly Detection and Visual Simultaneous Localisation and Mapping for Autonomous VehiclesSN 2213−1745 (430 words) [view diff] exact match in snippet view article find links to article
O.; Mondon, F.; Volnova, A. A.; Korolev, V. S. (November 2019). "Anomaly detection in the Open Supernova Catalog". Monthly Notices of the Royal AstronomicalOpenText Data Protector (550 words) [view diff] case mismatch in snippet view article find links to article
additional security features like Multi-Factor Authentication and Anomaly Detection have been added. Today's version of Data Protector provides full backwardsData lineage (5,937 words) [view diff] no match in snippet view article find links to article
Data lineage refers to the process of tracking how data is generated, transformed, transmitted and used across a system over time. It documents data'sDhruba K. Bhattacharyya (343 words) [view diff] case mismatch in snippet view article find links to article
is the vice-chancellor (in-charge) of Tezpur University. Network Anomaly Detection: A Machine Learning Perspective, with Jugal K Kalita, 2013, CRC PressHSM-49 (818 words) [view diff] case mismatch in snippet view article find links to article
advanced airborne active sonar. It is not equipped with the Magnetic Anomaly Detection (MAD) that the SH-60B employed. Pilot instrumentation is providedJennifer Ngadiuba (580 words) [view diff] exact match in snippet view article find links to article
high-energy particle physics at ultrafast speeds in real-time through anomaly detection. Since 2013, she has worked with at the Large Hadron Collider at CERNElastic NV (1,160 words) [view diff] exact match in snippet view article find links to article
Elastic acquired Prelert, a behavioral analytics vendor specializing in anomaly detection using machine learning, as part of its effort to compete with observabilityZeek (645 words) [view diff] exact match in snippet view article find links to article
another Zeek script. Zeek analyzers perform application layer decoding, anomaly detection, signature matching and connection analysis. Zeek's developers designedElection forensics (751 words) [view diff] exact match in snippet view article find links to article
forensics: Using machine learning and synthetic data for possible election anomaly detection". PLOS ONE. 14 (10): e0223950. Bibcode:2019PLoSO..1423950Z. doi:10Prognostics (3,870 words) [view diff] exact match in snippet view article find links to article
configure and customize the algorithms for signature extraction, anomaly detection, health assessment, failure diagnosis, and failure prediction forSecurity visualisation (511 words) [view diff] exact match in snippet view article find links to article
varying shades and patterns of color gradient. ELISHA is a visual anomaly detection system. The tool aims at identifying multiple origin autonomous systemDHS Border and Maritime Security Division (371 words) [view diff] exact match in snippet view article find links to article
examination by non-intrusive inspection Increased information fusion, anomaly detection, Automatic Target Recognition capability Detect and identify WMD materials3 Corner Satellite (452 words) [view diff] exact match in snippet view article find links to article
Execution and Replanning (CASPER) software, and Context-sensitive anomaly detection software (SELMON monitoring system) NASA Jet Propulsion LaboratoryWireless sensor network (6,458 words) [view diff] exact match in snippet view article find links to article
use. This technique has been used, for instance, for distributed anomaly detection or distributed optimization. As nodes can inspect the data they forwardK-class blimp (2,510 words) [view diff] exact match in snippet view article find links to article
had a detection range of 90 mi (140 km), sonobuoys, and magnetic anomaly detection (MAD) equipment. The K-ships carried four 350 lb (160 kg) depth bombsDorothy E. Denning (2,204 words) [view diff] exact match in snippet view article find links to article
developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI'sLockheed P-3 Orion (11,442 words) [view diff] exact match in snippet view article find links to article
its distinctive tail stinger or "MAD" boom, used for the magnetic anomaly detection (MAD) of submarines. Over the years, the P-3 has seen numerous designAirborne Real-time Cueing Hyperspectral Enhanced Reconnaissance (3,020 words) [view diff] exact match in snippet view article find links to article
matching where reflected light is matched to spectral signatures anomaly detection using a statistical model of the pixels in the image to determineKenitra Air Base (775 words) [view diff] exact match in snippet view article find links to article
shallow waters of the Straits of Gibraltar where radar and magnetic anomaly detection were viable. Craw Field was the final destination of the six K-shipsOSSIM (869 words) [view diff] exact match in snippet view article find links to article
address anomaly detection, replaced by PRADS. P0f, used for passive OS detection and OS change analysis, replaced by PRADS. PADS, used for service anomaly detectionDongmei Zhang (654 words) [view diff] exact match in snippet view article find links to article
Murali Chintalapati, Furao Shen, Dongmei Zhang "Robust log-based anomaly detection on unstable log data" (2019) Jiaqi Guo, Zecheng Zhan, Yan Gao, YanSignal processing (2,270 words) [view diff] exact match in snippet view article find links to article
success in the field of image processing, computer vision and sound anomaly detection. Audio signal processing – for electrical signals representing soundCyber threat intelligence (2,406 words) [view diff] case mismatch in snippet view article find links to article
A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection". 2019 IEEE Conference on Communications and Network Security (CNS)Naval aircrewman (2,249 words) [view diff] exact match in snippet view article find links to article
electronic warfare, active and passive sonar. Reading sonograms, magnetic anomaly detection equipment, physics, wave propagation, oceanography, meteorology andV. Ashley Villar (512 words) [view diff] exact match in snippet view article find links to article
Time-Series Classification Challenge (PLAsTiCC) in order to study anomaly detection in celestial observations. Villar is listed among model contributorsServerless computing (1,748 words) [view diff] exact match in snippet view article find links to article
challenges. Emerging technologies like OpenTelemetry, AI-powered anomaly detection, and serverless-specific frameworks are further improving visibilityAllot Ltd. (1,268 words) [view diff] case mismatch in snippet view article find links to article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 92 million (2024) Total equity US$ 140 million (2024)List of weapons of the Imperial Japanese Navy (1,828 words) [view diff] exact match in snippet view article find links to article
Kawanishi E7K2 ("Alf") Mark 2: short range seaplane, fitted with magnetic anomaly detection equipment and surface-search radar for short range patrol and antisubmarinePacket capture appliance (1,943 words) [view diff] exact match in snippet view article find links to article
techniques for network intrusion detection, traffic classification, and anomaly detection are used to identify potentially malicious traffic for collectionReal-time outbreak and disease surveillance (260 words) [view diff] case mismatch in snippet view article find links to article
Challenges Facing Early Outbreak Detection in Biosurveillance", Technometrics (Special Issue on Anomaly Detection), vol. 52, issue 1, pp. 39–51, 2010 v t eCall graph (1,566 words) [view diff] exact match in snippet view article find links to article
Dawn (25 October 2004). "Gray-box extraction of execution graphs for anomaly detection". Proceedings of the 11th ACM conference on Computer and communicationsSense Networks (809 words) [view diff] case mismatch in snippet view article find links to article
Spatial-Temporal Trails in Location Analytics (US 20100079336), and Anomaly Detection in Sensor Analytics (US 20100082301). The company was acquired byThomas G. Dietterich (2,778 words) [view diff] case mismatch in snippet view article find links to article
Dietterich, Shubhomoy Das (2016). Finite Sample Complexity of Rare Pattern Anomaly Detection. Uncertainty in Artificial Intelligence (UAI-2016). New York, NY Alkaee-TaleghanDegaussing (2,956 words) [view diff] exact match in snippet view article find links to article
facilitate the detection of a submarine by ships or aircraft with magnetic anomaly detection (MAD) equipment. Navies use the deperming procedure, in conjunctionMod qos (826 words) [view diff] exact match in snippet view article find links to article
upload/download throughput a client must generate. September 2009, Version 9: Anomaly detection using client characteristic measurement. February 2012, Version 10:Anti-submarine warfare (7,825 words) [view diff] exact match in snippet view article find links to article
surprise and attack enemy submarines on the surface at night. Magnetic anomaly detection Diesel exhaust sniffers Sonobuoys Weaponry Depth charges, the mostMilitary helicopter (3,144 words) [view diff] exact match in snippet view article find links to article
King, to be equipped with integral dunking sonar, radar and magnetic anomaly detection equipment. The result was an aircraft able to more quickly respondCFEngine (1,180 words) [view diff] exact match in snippet view article find links to article
re-write, CFEngine 2, which added features for machine learning, anomaly detection and secure communications. Between 1998 and 2004, CFEngine grew inWebist (1,815 words) [view diff] case mismatch in snippet view article find links to article
Antti Juvonen. "GROWING HIERARCHICAL SELF-ORGANISING MAPS FOR ONLINE ANOMALY DETECTION BY USING NETWORK LOGS" Proceedings - Proceedings of the 7th InternationalHoneytoken (469 words) [view diff] case mismatch in snippet view article find links to article
PMC 9185350. PMID 35684744. DLP and honeytokens IDS: RES: Protocol Anomaly Detection IDS – Honeypots Has my mailing list been stolen? | Plynt SecurityDouglas B-18 Bolo (3,090 words) [view diff] exact match in snippet view article find links to article
bombardier was replaced by a search radar with a large radome. Magnetic anomaly detection (MAD) equipment was sometimes housed in a tail boom. These aircraftGoogle Analytics (3,927 words) [view diff] exact match in snippet view article find links to article
built-in DebugView to analyze and debug the upcoming data instantly, Anomaly detection, Improved e-commerce reports. Has feature to analysis user journeyKansas Geological Survey (2,010 words) [view diff] no match in snippet view article find links to article
to advance the research and development of an automated subterrain anomaly-detection system using active seismic-imaging (ASI) technologies to be usedShared Whois Project (397 words) [view diff] case mismatch in snippet view article find links to article
Gleichmann; Doug Montgomery (2009). "A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms". 2009 Cybersecurity Applications & TechnologyHyper-surveillance (1,100 words) [view diff] exact match in snippet view article find links to article
Zhang, Y.; Li, M.; Dong, Z. Y.; Meng, K. (June 2019). "Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring". CSEEWebroot (1,838 words) [view diff] exact match in snippet view article find links to article
of CyberFlow Analytics, a company applying data science to network anomaly detection. In February 2019 Webroot announced that it would be acquired by CarboniteNaval Station Argentia (2,468 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and PB4Y-2) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the StraitGlassbox (1,240 words) [view diff] exact match in snippet view article find links to article
and churn prediction, real-time fraud detection and prevention, and anomaly detection systems, and they could help enterprise clients anticipate issuesSKYNET (surveillance program) (461 words) [view diff] exact match in snippet view article
statistical discrepancies with behavioral abnormalities and that the anomaly detection methodology SKYNET perpetuates the self/other binary. For exampleList of .NET libraries and frameworks (2,763 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approachesShaanxi Y-8 (3,149 words) [view diff] exact match in snippet view article find links to article
air-to-surface search radar, a side-looking ISAR radar and a magnetic anomaly detection tube. Y-8EW: New EW aircraft. Y-8 Gunship: A projected gunship versionSea anemone (4,773 words) [view diff] case mismatch in snippet view article find links to article
Bojani (2011). Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer Science & BusinessHeterophily (1,534 words) [view diff] exact match in snippet view article find links to article
Heterophily is closely related to many real-world applications, e.g. fraud/anomaly detection, graph clustering, recommender systems, generative models, link predictionIoBT-CRA (717 words) [view diff] exact match in snippet view article find links to article
tasks such as information collection, predictive processing, and data anomaly detection. Security: Methods of increasing the defenses of IoBTs such that theBreakthrough Listen (3,503 words) [view diff] case mismatch in snippet view article find links to article
Seung Woo Son; Andrew Siemion; Steve Croft (2019). "Self-Supervised Anomaly Detection for Narrowband SETI". arXiv:1901.04636 [astro-ph.IM]. "Open Data"Peter Tippett (1,190 words) [view diff] exact match in snippet view article find links to article
image signatures, using hash-tables for trusted file execution and anomaly detection, aspects of mail merge and "un-do." He ran a bulletin board systemTurbomachinery (2,486 words) [view diff] case mismatch in snippet view article find links to article
Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application". International Joint ConferenceSmart meter (9,233 words) [view diff] exact match in snippet view article find links to article
Analysis, where analytical tools provide insights, load forecasting, and anomaly detection for optimized energy management. Together, these components help utilitiesConcept drift (2,900 words) [view diff] exact match in snippet view article find links to article
Numenta Anomaly Benchmark, benchmark for evaluating algorithms for anomaly detection in streaming, real-time applications. (2014–2018) 2014 [] SpecialLastline (968 words) [view diff] case mismatch in snippet view article find links to article
security Countermeasure (computer) IT risk Malware Network Behavior Anomaly Detection Threat (computer) Yokwicz, Will Watching the (Digital) DetectivesThe Signpost (4,189 words) [view diff] exact match in snippet view article find links to article
2018. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011Wei Wang (computer scientist) (721 words) [view diff] case mismatch in snippet view article
pp. 197–206, 2018. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks, by Wenchao Yu, Wei Cheng, Charu Aggarwal, KaiMichael R. Lyu (1,016 words) [view diff] case mismatch in snippet view article find links to article
years of ISSRE (2019) Experience Report: System Log Analysis for Anomaly Detection (ISSRE'16) ACM SIGSOFT Distinguished Paper Award (2023)] GenerativeCyber Assessment Framework (307 words) [view diff] exact match in snippet view article find links to article
Objective C: Detecting cyber security events C.1 Security monitoring C.2 Anomaly detection Objective D: Minimising the impact of cyber security incidents D.1Cohesity (1,687 words) [view diff] exact match in snippet view article find links to article
provides anti-ransomware features including machine learning-based anomaly detection. Through the acquisition of Imanis Data in 2019, Cohesity extendedSocial media measurement (1,967 words) [view diff] exact match in snippet view article find links to article
S2CID 13987132. Wang, Wei (2011). "Network traffic monitoring, analysis and anomaly detection [Guest Editorial]". IEEE Network. 25 (3): 6–7. doi:10.1109/mnet.2011Portugal during World War II (5,584 words) [view diff] exact match in snippet view article find links to article
of German U-boats around the Straits of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from WeeksvilleHMS Wishart (2,909 words) [view diff] exact match in snippet view article find links to article
Navy PBY Catalina aircraft of Patrol Squadron 63 using magnetic anomaly detection equipment detected the German submarine U-761 near Tangier while U-761Krishnendu Chakrabarty (795 words) [view diff] case mismatch in snippet view article find links to article
for his paper "Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques." He also received the 2021 Vitold Belevitch Award forIndustrial data processing (1,076 words) [view diff] exact match in snippet view article find links to article
increase reliability. Pre-processing functions may include filtering, anomaly detection, and logic-based event handling. Storage and Archiving Data historiansList of spatial analysis software (58 words) [view diff] exact match in snippet view article find links to article
geo-triggered events, dynamic and complex route calculations and automated anomaly detection are just a mouse click away. Independent benchmark tests by academiaLajes Field (4,103 words) [view diff] exact match in snippet view article find links to article
for German U-boats around the Strait of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from WeeksvilleVishal Monga (776 words) [view diff] case mismatch in snippet view article find links to article
in Color Image Processing: Methods and Applications (2006) "Video Anomaly Detection" in Computer Vision and Imaging in Intelligent Transportation SystemsNaval Air Station South Weymouth (3,538 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and B-24s) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the StraitsCheating in online games (6,096 words) [view diff] no match in snippet view article find links to article
On online games, cheating subverts the rules or mechanics of the games to gain an unfair advantage over other players, generally with the use of third-partyUnderwater searches (10,671 words) [view diff] exact match in snippet view article find links to article
ships. Air searches can be done for magnetic targets using magnetic anomaly detection (MAD) systems, which use a sensitive magnetometer carried by an aircraftIBM System Management Facilities (1,359 words) [view diff] exact match in snippet view article find links to article
log-based and metric-based machine learning technology to provide anomaly detection. IBM Db2 Analytics Accelerator for z/OS, a database application thatSmall Satellite Research Laboratory (1,168 words) [view diff] exact match in snippet view article find links to article
from motion, surface reconstruction, data compression, and oceanic anomaly detection. UGA Small Satellite Research Laboratory Team and History "Dean'sVP-5 (4,920 words) [view diff] exact match in snippet view article find links to article
1948 VP-ML-5 received the first P2V Neptune, equipped with magnetic anomaly detection (MAD) equipment capable of detecting large magnetic objects underwaterBattery electric vehicle (6,981 words) [view diff] exact match in snippet view article find links to article
management, the controller performs various safety checks such as anomaly detection, functional safety tests and failure diagnostics. Most electric vehiclesNeptune Mission (813 words) [view diff] exact match in snippet view article find links to article
Neptune aircraft. The advent of airborne radar, sonar and magnetic anomaly detection (MAD)-equipped aircraft such as the Neptune, made for a potent counterFault detection and isolation (3,228 words) [view diff] case mismatch in snippet view article find links to article
Invalidation for Switched Affine Systems with Applications to Fault and Anomaly Detection**This work is supported in part by DARPA grant N66001-14-1-4045".Primeval: New World (2,394 words) [view diff] exact match in snippet view article find links to article
his cooperation on the anomalies, but is rebuffed. Toby creates an anomaly detection system by hacking the local cell phone network, and immediately detectsDan Blumberg (820 words) [view diff] exact match in snippet view article find links to article
other applications such homeland security, rapid response, target and anomaly detection and situational awareness. Within these studies Blumberg has beenZia Chishti (1,791 words) [view diff] exact match in snippet view article find links to article
identification of patterns within complex data, including medical image anomaly detection, hydrocarbon detection, consumer behavioral predication and fraudInformation Processing in Medical Imaging (1,631 words) [view diff] case mismatch in snippet view article find links to article
Philipp Seeböck, Sebastian Waldstein, Georg Langs: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery 2019Chile Ridge (4,012 words) [view diff] exact match in snippet view article find links to article
the bathymetry and magnetic profiles study, as well as the gravity anomaly detection. The Valdivia Fault Zone has caused the offset of the north and southIncoming (1998 video game) (2,062 words) [view diff] case mismatch in snippet view article
construction of a base in the Arctic. Secret work is started on an "ADATA" (Anomaly Detection And Tracking Array) near Mount Kilimanjaro. The events of the gamePeiter Zatko (3,141 words) [view diff] case mismatch in snippet view article find links to article
at the Wayback Machine, Andy Greenberg, Forbes, November 29, 2010 "Anomaly Detection at Multiple Scales". 16 October 2011. Archived from the original onMEMS magnetic field sensor (2,268 words) [view diff] exact match in snippet view article find links to article
nT), better sensors are required. For the application of magnetic anomaly detection, sensors at different locations have to be used to cancel the spatial-correlatedUS Navy airships during World War II (1,728 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. Consolidated PBY Catalina aircraft had been searching2004 Venezuelan recall referendum (4,952 words) [view diff] case mismatch in snippet view article find links to article
Science 26(4) Luis Raul Pericchi and David A Torres (2011), Quick Anomaly Detection by the Newcomb–Benford Law, with Applications to Electoral ProcessesBoeing P-8 Poseidon (11,969 words) [view diff] exact match in snippet view article find links to article
deleted the requirement for the P-8A to be equipped with magnetic anomaly detection (MAD) equipment as a weight reduction measure, improving enduranceCAN bus (9,553 words) [view diff] exact match in snippet view article find links to article
performance. Intrusion Detection Systems (IDS): Advanced IDS and anomaly detection algorithms—often incorporating machine learning—monitor CAN trafficSoftware-defined networking (6,000 words) [view diff] exact match in snippet view article find links to article
(2014). "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments". Computer Networks.Dan Hendrycks (860 words) [view diff] case mismatch in snippet view article find links to article
Hendrycks, Dan; Mazeika, Mantas; Dietterich, Thomas (2019-01-28). "Deep Anomaly Detection with Outlier Exposure". International Conference on Learning RepresentationsTwitch Plays Pokémon (5,861 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 25 February 2014. A. Haque. "Unsupervised Context-Aware Anomaly Detection for Identifying Trolls in Streaming Data Archived 5 July 2022 at theGen Digital (8,555 words) [view diff] case mismatch in snippet view article find links to article
protect connected vehicles against zero-day attacks. The Symantec Anomaly Detection for Automotive is an IoT product for manufacturers and uses machineCT scan (16,226 words) [view diff] case mismatch in snippet view article find links to article
spectral CT". In Greenberg JA, Gehm ME, Neifeld MA, Ashok A (eds.). Anomaly Detection and Imaging with X-Rays (ADIX) III. p. 12. doi:10.1117/12.2309663Magnetic flux leakage (2,127 words) [view diff] exact match in snippet view article find links to article
States National Technical Information Center 1999 REMPEL, Raymond - Anomaly detection using Magnetic Flux Leakage ( MFL ) Technology - Presented at theAlfonso Farina (1,986 words) [view diff] case mismatch in snippet view article find links to article
of the state-of-the-art Covariance-based Methods for Statistical Anomaly Detection Algorithms". Signal, Image and Video Processing. 10 (4): 687–694.Airship (16,170 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. PBY aircraft had been searching these waters butSelf-driving car (15,647 words) [view diff] case mismatch in snippet view article find links to article
Ali; Alsini, Raed (15 July 2022). "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry. 14 (7): 1450Government by algorithm (8,036 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, andSmart grid (14,274 words) [view diff] case mismatch in snippet view article find links to article
Pedro Henriques (2024-05-06). "Data-Centric Federated Learning for Anomaly Detection in Smart Grids and Other Industrial Control Systems". NOMS 2024-2024Yuval Elovici (2,673 words) [view diff] exact match in snippet view article find links to article
devices based on various techniques, such as temporal reasoning and anomaly detection. In addition, an efficient, collaborative application-monitoring schemeAutomatic identification system (11,207 words) [view diff] exact match in snippet view article find links to article
for safety and optimisation of seafaring, namely traffic analysis, anomaly detection, route extraction and prediction, collision detection, path planningGeophysical MASINT (9,507 words) [view diff] case mismatch in snippet view article find links to article
promise, but these sensors must be fairly close to the target. Magnetic Anomaly Detection (MAD) is used in antisubmarine warfare, for final localization beforeVP-44 (1951–1991) (2,217 words) [view diff] exact match in snippet view article
power and endurance, the new aircraft were supplied with magnetic anomaly detection (MAD) gear to round out the electronic capabilities of the squadronInternet fraud prevention (3,365 words) [view diff] exact match in snippet view article find links to article
techniques, including machine-learning-based behavior analytics and anomaly detection; the use of a "fraud hub" that enables third-party data sources toDavid McCarthy (academic) (1,191 words) [view diff] exact match in snippet view article
loggers and sensors. They developed new sensors, loggers, and AI anomaly detection algorithms and applied them to a smart sensor array that could detectData valuation (2,652 words) [view diff] exact match in snippet view article find links to article
PMID 36380246. Lee , W; Xiang, D (2001). "Information-theoretic measures for anomaly detection". Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001List of ProCurve products (1,970 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on ModuleList of Primeval characters (20,578 words) [view diff] case mismatch in snippet view article find links to article
The anomaly that Christine has is normally cloaked from the ARC's Anomaly Detection Device (presumably by radio jamming on the frequency used by the detector)List of people with epilepsy (6,413 words) [view diff] case mismatch in snippet view article find links to article
famously worked at the NSA where she created the Computer Misuse and Anomaly Detection (CMAD) Program and intrusion detection software at Los Alamos. BarryLuís M. A. Bettencourt (1,489 words) [view diff] case mismatch in snippet view article find links to article
"Towards Real Time Epidemiology: Data Assimilation, Modeling and Anomaly Detection of Health Surveillance Data Streams". Intelligence and Security Informatics:Cellular neural network (10,029 words) [view diff] exact match in snippet view article find links to article
infrared imagery, calorimeter cluster peak for high energy physics, anomaly detection in potential field maps for geophysics, laser dot detection, metalNitesh Chawla (1,597 words) [view diff] exact match in snippet view article find links to article
Chawla, N. V. (2019, July). A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings ofUSS Davis (DD-937) (12,977 words) [view diff] case mismatch in snippet view article
controllers on board Davis and Fred T. Berry conducted over 1,200 Magnetic Anomaly Detection verification runs on the submarine, utilizing aircraft from EssexRAF Coastal Command during World War II (16,504 words) [view diff] case mismatch in snippet view article find links to article
judgement by direct sighting with considerable success. Magnetic Anomaly Detection (MAD) was used to detect submerged U-boats. It consisted of a sensitive