Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Anomaly Detection at Multiple Scales (view), Network behavior anomaly detection (view)

searching for Anomaly detection 141 found (405 total)

alternate case: anomaly detection

Magnetic anomaly detector (805 words) [view diff] case mismatch in snippet view article find links to article

Wang, Siwei; Chen, Dixiang; Hu, Jingtao; Pan, Xue (2019). "Magnetic Anomaly Detection Based on Full Connected Neural Network". IEEE Access. 7. IEEE: 182198
Global Maritime Situational Awareness (463 words) [view diff] exact match in snippet view article find links to article
"Maritime anomaly detection" returns a large number of hits from a wide range of domains. Some of the related topics are: Maritime anomaly detection and situation
Anomaly-based intrusion detection system (554 words) [view diff] exact match in snippet view article find links to article
recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors
ML.NET (1,604 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approaches
Anti-submarine weapon (3,992 words) [view diff] case mismatch in snippet view article find links to article
anti-submarine forces also began employing autogyro aircraft and Magnetic Anomaly Detection (MAD) equipment to sink U.S. subs, particularly those plying major
NetQoS (308 words) [view diff] case mismatch in snippet view article find links to article
company was acquired by CA Technologies include: Performance Center Anomaly Detection Network latency calculator Earlier offerings include: SuperAgent a
Tracing (software) (1,313 words) [view diff] exact match in snippet view article
fall into a terminological gray area. Tracing is primarily used for anomaly detection, fault analysis, debugging or diagnostic purposes in distributed software
Mark Burgess (computer scientist) (2,269 words) [view diff] exact match in snippet view article
the proof of concept platform using these methods for system state anomaly detection, from 2002 to the present, and received widespread use. Based on these
Automated X-ray inspection (1,388 words) [view diff] exact match in snippet view article find links to article
of the inspection are used to optimize following processing steps, Anomaly detection, i.e. the result of the inspection serve as a criterion to reject
Comparison of cognitive architectures (150 words) [view diff] exact match in snippet view article find links to article
Hierarchical Temporal Memory connectionist online learning, anomaly detection ? anomaly detection Active 2009 Hawkins et al (multiple) AGPL LIDA symbolic
Rebecca Bace (934 words) [view diff] case mismatch in snippet view article find links to article
National Security Agency where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computer
Anderson function (762 words) [view diff] exact match in snippet view article find links to article
along an arbitrary line. They are useful in the study of magnetic anomaly detection, with historical applications in submarine hunting and underwater
Sematext (145 words) [view diff] exact match in snippet view article find links to article
on-premises systems for application performance monitoring, alerting, anomaly detection, centralized logging, logging management, analytics, and real user
Argus – Audit Record Generation and Utilization System (919 words) [view diff] case mismatch in snippet view article find links to article
traffic measurement data for network forensics and Network Behavior Anomaly Detection (NBAD). Argus has been used extensively in cybersecurity, end-to-end
Flowmon Networks (554 words) [view diff] exact match in snippet view article find links to article
probes and collectors by analytical features for network behavior anomaly detection, network awareness application performance management, DDoS detection
Vir Phoha (787 words) [view diff] exact match in snippet view article find links to article
research focuses on attack-averse authentication, spoof-resistance, anomaly detection, machine learning, optimized attack formulation, and spatial-temporal
Medoid (4,008 words) [view diff] exact match in snippet view article find links to article
identifying anomalies, and one efficient method is through cluster-based anomaly detection. They can be used to discover clusters of data points that deviate
Jugal Kalita (201 words) [view diff] case mismatch in snippet view article find links to article
for Students and Professionals, 2003, Universal Publishers Network Anomaly Detection: A Machine Learning Perspective, with Dhruba K. Bhattacharyya, 2013
Diffusion map (2,482 words) [view diff] exact match in snippet view article find links to article
speaker verification and identification, sampling on manifolds, anomaly detection, image inpainting, revealing brain resting state networks organization
Dasient (408 words) [view diff] exact match in snippet view article find links to article
behavioral-based engine - based on sophisticated algorithms and anomaly detection technology - to defend against the latest attacks using up-to-date
Abiodun Musa Aibinu (902 words) [view diff] case mismatch in snippet view article find links to article
Matters. Performance Evaluation of You Only Look Once v4 in Road Anomaly Detection and Visual Simultaneous Localisation and Mapping for Autonomous Vehicles
SN 2213−1745 (430 words) [view diff] exact match in snippet view article find links to article
O.; Mondon, F.; Volnova, A. A.; Korolev, V. S. (November 2019). "Anomaly detection in the Open Supernova Catalog". Monthly Notices of the Royal Astronomical
OpenText Data Protector (550 words) [view diff] case mismatch in snippet view article find links to article
additional security features like Multi-Factor Authentication and Anomaly Detection have been added. Today's version of Data Protector provides full backwards
Data lineage (5,937 words) [view diff] no match in snippet view article find links to article
Data lineage refers to the process of tracking how data is generated, transformed, transmitted and used across a system over time. It documents data's
Dhruba K. Bhattacharyya (343 words) [view diff] case mismatch in snippet view article find links to article
is the vice-chancellor (in-charge) of Tezpur University. Network Anomaly Detection: A Machine Learning Perspective, with Jugal K Kalita, 2013, CRC Press
HSM-49 (818 words) [view diff] case mismatch in snippet view article find links to article
advanced airborne active sonar. It is not equipped with the Magnetic Anomaly Detection (MAD) that the SH-60B employed. Pilot instrumentation is provided
Jennifer Ngadiuba (580 words) [view diff] exact match in snippet view article find links to article
high-energy particle physics at ultrafast speeds in real-time through anomaly detection. Since 2013, she has worked with at the Large Hadron Collider at CERN
Elastic NV (1,160 words) [view diff] exact match in snippet view article find links to article
Elastic acquired Prelert, a behavioral analytics vendor specializing in anomaly detection using machine learning, as part of its effort to compete with observability
Zeek (645 words) [view diff] exact match in snippet view article find links to article
another Zeek script. Zeek analyzers perform application layer decoding, anomaly detection, signature matching and connection analysis. Zeek's developers designed
Election forensics (751 words) [view diff] exact match in snippet view article find links to article
forensics: Using machine learning and synthetic data for possible election anomaly detection". PLOS ONE. 14 (10): e0223950. Bibcode:2019PLoSO..1423950Z. doi:10
Prognostics (3,870 words) [view diff] exact match in snippet view article find links to article
configure and customize the algorithms for signature extraction, anomaly detection, health assessment, failure diagnosis, and failure prediction for
Security visualisation (511 words) [view diff] exact match in snippet view article find links to article
varying shades and patterns of color gradient. ELISHA is a visual anomaly detection system. The tool aims at identifying multiple origin autonomous system
DHS Border and Maritime Security Division (371 words) [view diff] exact match in snippet view article find links to article
examination by non-intrusive inspection Increased information fusion, anomaly detection, Automatic Target Recognition capability Detect and identify WMD materials
3 Corner Satellite (452 words) [view diff] exact match in snippet view article find links to article
Execution and Replanning (CASPER) software, and Context-sensitive anomaly detection software (SELMON monitoring system) NASA Jet Propulsion Laboratory
Wireless sensor network (6,458 words) [view diff] exact match in snippet view article find links to article
use. This technique has been used, for instance, for distributed anomaly detection or distributed optimization. As nodes can inspect the data they forward
K-class blimp (2,510 words) [view diff] exact match in snippet view article find links to article
had a detection range of 90 mi (140 km), sonobuoys, and magnetic anomaly detection (MAD) equipment. The K-ships carried four 350 lb (160 kg) depth bombs
Dorothy E. Denning (2,204 words) [view diff] exact match in snippet view article find links to article
developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI's
Lockheed P-3 Orion (11,442 words) [view diff] exact match in snippet view article find links to article
its distinctive tail stinger or "MAD" boom, used for the magnetic anomaly detection (MAD) of submarines. Over the years, the P-3 has seen numerous design
Airborne Real-time Cueing Hyperspectral Enhanced Reconnaissance (3,020 words) [view diff] exact match in snippet view article find links to article
matching where reflected light is matched to spectral signatures anomaly detection using a statistical model of the pixels in the image to determine
Kenitra Air Base (775 words) [view diff] exact match in snippet view article find links to article
shallow waters of the Straits of Gibraltar where radar and magnetic anomaly detection were viable. Craw Field was the final destination of the six K-ships
OSSIM (869 words) [view diff] exact match in snippet view article find links to article
address anomaly detection, replaced by PRADS. P0f, used for passive OS detection and OS change analysis, replaced by PRADS. PADS, used for service anomaly detection
Dongmei Zhang (654 words) [view diff] exact match in snippet view article find links to article
Murali Chintalapati, Furao Shen, Dongmei Zhang "Robust log-based anomaly detection on unstable log data" (2019) Jiaqi Guo, Zecheng Zhan, Yan Gao, Yan
Signal processing (2,270 words) [view diff] exact match in snippet view article find links to article
success in the field of image processing, computer vision and sound anomaly detection. Audio signal processing – for electrical signals representing sound
Cyber threat intelligence (2,406 words) [view diff] case mismatch in snippet view article find links to article
A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection". 2019 IEEE Conference on Communications and Network Security (CNS)
Naval aircrewman (2,249 words) [view diff] exact match in snippet view article find links to article
electronic warfare, active and passive sonar. Reading sonograms, magnetic anomaly detection equipment, physics, wave propagation, oceanography, meteorology and
V. Ashley Villar (512 words) [view diff] exact match in snippet view article find links to article
Time-Series Classification Challenge (PLAsTiCC) in order to study anomaly detection in celestial observations. Villar is listed among model contributors
Serverless computing (1,748 words) [view diff] exact match in snippet view article find links to article
challenges. Emerging technologies like OpenTelemetry, AI-powered anomaly detection, and serverless-specific frameworks are further improving visibility
Allot Ltd. (1,268 words) [view diff] case mismatch in snippet view article find links to article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 92 million (2024) Total equity US$ 140 million (2024)
List of weapons of the Imperial Japanese Navy (1,828 words) [view diff] exact match in snippet view article find links to article
Kawanishi E7K2 ("Alf") Mark 2: short range seaplane, fitted with magnetic anomaly detection equipment and surface-search radar for short range patrol and antisubmarine
Packet capture appliance (1,943 words) [view diff] exact match in snippet view article find links to article
techniques for network intrusion detection, traffic classification, and anomaly detection are used to identify potentially malicious traffic for collection
Real-time outbreak and disease surveillance (260 words) [view diff] case mismatch in snippet view article find links to article
Challenges Facing Early Outbreak Detection in Biosurveillance", Technometrics (Special Issue on Anomaly Detection), vol. 52, issue 1, pp. 39–51, 2010 v t e
Call graph (1,566 words) [view diff] exact match in snippet view article find links to article
Dawn (25 October 2004). "Gray-box extraction of execution graphs for anomaly detection". Proceedings of the 11th ACM conference on Computer and communications
Sense Networks (809 words) [view diff] case mismatch in snippet view article find links to article
Spatial-Temporal Trails in Location Analytics (US 20100079336), and Anomaly Detection in Sensor Analytics (US 20100082301). The company was acquired by
Thomas G. Dietterich (2,778 words) [view diff] case mismatch in snippet view article find links to article
Dietterich, Shubhomoy Das (2016). Finite Sample Complexity of Rare Pattern Anomaly Detection. Uncertainty in Artificial Intelligence (UAI-2016). New York, NY Alkaee-Taleghan
Degaussing (2,956 words) [view diff] exact match in snippet view article find links to article
facilitate the detection of a submarine by ships or aircraft with magnetic anomaly detection (MAD) equipment. Navies use the deperming procedure, in conjunction
Mod qos (826 words) [view diff] exact match in snippet view article find links to article
upload/download throughput a client must generate. September 2009, Version 9: Anomaly detection using client characteristic measurement. February 2012, Version 10:
Anti-submarine warfare (7,825 words) [view diff] exact match in snippet view article find links to article
surprise and attack enemy submarines on the surface at night. Magnetic anomaly detection Diesel exhaust sniffers Sonobuoys Weaponry Depth charges, the most
Military helicopter (3,144 words) [view diff] exact match in snippet view article find links to article
King, to be equipped with integral dunking sonar, radar and magnetic anomaly detection equipment. The result was an aircraft able to more quickly respond
CFEngine (1,180 words) [view diff] exact match in snippet view article find links to article
re-write, CFEngine 2, which added features for machine learning, anomaly detection and secure communications. Between 1998 and 2004, CFEngine grew in
Webist (1,815 words) [view diff] case mismatch in snippet view article find links to article
Antti Juvonen. "GROWING HIERARCHICAL SELF-ORGANISING MAPS FOR ONLINE ANOMALY DETECTION BY USING NETWORK LOGS" Proceedings - Proceedings of the 7th International
Honeytoken (469 words) [view diff] case mismatch in snippet view article find links to article
PMC 9185350. PMID 35684744. DLP and honeytokens IDS: RES: Protocol Anomaly Detection IDS – Honeypots Has my mailing list been stolen? | Plynt Security
Douglas B-18 Bolo (3,090 words) [view diff] exact match in snippet view article find links to article
bombardier was replaced by a search radar with a large radome. Magnetic anomaly detection (MAD) equipment was sometimes housed in a tail boom. These aircraft
Google Analytics (3,927 words) [view diff] exact match in snippet view article find links to article
built-in DebugView to analyze and debug the upcoming data instantly, Anomaly detection, Improved e-commerce reports. Has feature to analysis user journey
Kansas Geological Survey (2,010 words) [view diff] no match in snippet view article find links to article
to advance the research and development of an automated subterrain anomaly-detection system using active seismic-imaging (ASI) technologies to be used
Shared Whois Project (397 words) [view diff] case mismatch in snippet view article find links to article
Gleichmann; Doug Montgomery (2009). "A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms". 2009 Cybersecurity Applications & Technology
Hyper-surveillance (1,100 words) [view diff] exact match in snippet view article find links to article
Zhang, Y.; Li, M.; Dong, Z. Y.; Meng, K. (June 2019). "Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring". CSEE
Webroot (1,838 words) [view diff] exact match in snippet view article find links to article
of CyberFlow Analytics, a company applying data science to network anomaly detection. In February 2019 Webroot announced that it would be acquired by Carbonite
Naval Station Argentia (2,468 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and PB4Y-2) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Strait
Glassbox (1,240 words) [view diff] exact match in snippet view article find links to article
and churn prediction, real-time fraud detection and prevention, and anomaly detection systems, and they could help enterprise clients anticipate issues
SKYNET (surveillance program) (461 words) [view diff] exact match in snippet view article
statistical discrepancies with behavioral abnormalities and that the anomaly detection methodology SKYNET perpetuates the self/other binary. For example
List of .NET libraries and frameworks (2,763 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approaches
Shaanxi Y-8 (3,149 words) [view diff] exact match in snippet view article find links to article
air-to-surface search radar, a side-looking ISAR radar and a magnetic anomaly detection tube. Y-8EW: New EW aircraft. Y-8 Gunship: A projected gunship version
Sea anemone (4,773 words) [view diff] case mismatch in snippet view article find links to article
Bojani (2011). Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer Science & Business
Heterophily (1,534 words) [view diff] exact match in snippet view article find links to article
Heterophily is closely related to many real-world applications, e.g. fraud/anomaly detection, graph clustering, recommender systems, generative models, link prediction
IoBT-CRA (717 words) [view diff] exact match in snippet view article find links to article
tasks such as information collection, predictive processing, and data anomaly detection. Security: Methods of increasing the defenses of IoBTs such that the
Breakthrough Listen (3,503 words) [view diff] case mismatch in snippet view article find links to article
Seung Woo Son; Andrew Siemion; Steve Croft (2019). "Self-Supervised Anomaly Detection for Narrowband SETI". arXiv:1901.04636 [astro-ph.IM]. "Open Data"
Peter Tippett (1,190 words) [view diff] exact match in snippet view article find links to article
image signatures, using hash-tables for trusted file execution and anomaly detection, aspects of mail merge and "un-do." He ran a bulletin board system
Turbomachinery (2,486 words) [view diff] case mismatch in snippet view article find links to article
Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application". International Joint Conference
Smart meter (9,233 words) [view diff] exact match in snippet view article find links to article
Analysis, where analytical tools provide insights, load forecasting, and anomaly detection for optimized energy management. Together, these components help utilities
Concept drift (2,900 words) [view diff] exact match in snippet view article find links to article
Numenta Anomaly Benchmark, benchmark for evaluating algorithms for anomaly detection in streaming, real-time applications. (2014–2018) 2014 [] Special
Lastline (968 words) [view diff] case mismatch in snippet view article find links to article
security Countermeasure (computer) IT risk Malware Network Behavior Anomaly Detection Threat (computer) Yokwicz, Will Watching the (Digital) Detectives
The Signpost (4,189 words) [view diff] exact match in snippet view article find links to article
2018. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011
Wei Wang (computer scientist) (721 words) [view diff] case mismatch in snippet view article
pp. 197–206, 2018. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks, by Wenchao Yu, Wei Cheng, Charu Aggarwal, Kai
Michael R. Lyu (1,016 words) [view diff] case mismatch in snippet view article find links to article
years of ISSRE (2019) Experience Report: System Log Analysis for Anomaly Detection (ISSRE'16) ACM SIGSOFT Distinguished Paper Award (2023)] Generative
Cyber Assessment Framework (307 words) [view diff] exact match in snippet view article find links to article
Objective C: Detecting cyber security events C.1 Security monitoring C.2 Anomaly detection Objective D: Minimising the impact of cyber security incidents D.1
Cohesity (1,687 words) [view diff] exact match in snippet view article find links to article
provides anti-ransomware features including machine learning-based anomaly detection. Through the acquisition of Imanis Data in 2019, Cohesity extended
Social media measurement (1,967 words) [view diff] exact match in snippet view article find links to article
S2CID 13987132. Wang, Wei (2011). "Network traffic monitoring, analysis and anomaly detection [Guest Editorial]". IEEE Network. 25 (3): 6–7. doi:10.1109/mnet.2011
Portugal during World War II (5,584 words) [view diff] exact match in snippet view article find links to article
of German U-boats around the Straits of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from Weeksville
HMS Wishart (2,909 words) [view diff] exact match in snippet view article find links to article
Navy PBY Catalina aircraft of Patrol Squadron 63 using magnetic anomaly detection equipment detected the German submarine U-761 near Tangier while U-761
Krishnendu Chakrabarty (795 words) [view diff] case mismatch in snippet view article find links to article
for his paper "Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques." He also received the 2021 Vitold Belevitch Award for
Industrial data processing (1,076 words) [view diff] exact match in snippet view article find links to article
increase reliability. Pre-processing functions may include filtering, anomaly detection, and logic-based event handling. Storage and Archiving Data historians
List of spatial analysis software (58 words) [view diff] exact match in snippet view article find links to article
geo-triggered events, dynamic and complex route calculations and automated anomaly detection are just a mouse click away. Independent benchmark tests by academia
Lajes Field (4,103 words) [view diff] exact match in snippet view article find links to article
for German U-boats around the Strait of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from Weeksville
Vishal Monga (776 words) [view diff] case mismatch in snippet view article find links to article
in Color Image Processing: Methods and Applications (2006) "Video Anomaly Detection" in Computer Vision and Imaging in Intelligent Transportation Systems
Naval Air Station South Weymouth (3,538 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and B-24s) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Straits
Cheating in online games (6,096 words) [view diff] no match in snippet view article find links to article
On online games, cheating subverts the rules or mechanics of the games to gain an unfair advantage over other players, generally with the use of third-party
Underwater searches (10,671 words) [view diff] exact match in snippet view article find links to article
ships. Air searches can be done for magnetic targets using magnetic anomaly detection (MAD) systems, which use a sensitive magnetometer carried by an aircraft
IBM System Management Facilities (1,359 words) [view diff] exact match in snippet view article find links to article
log-based and metric-based machine learning technology to provide anomaly detection. IBM Db2 Analytics Accelerator for z/OS, a database application that
Small Satellite Research Laboratory (1,168 words) [view diff] exact match in snippet view article find links to article
from motion, surface reconstruction, data compression, and oceanic anomaly detection. UGA Small Satellite Research Laboratory Team and History "Dean's
VP-5 (4,920 words) [view diff] exact match in snippet view article find links to article
1948 VP-ML-5 received the first P2V Neptune, equipped with magnetic anomaly detection (MAD) equipment capable of detecting large magnetic objects underwater
Battery electric vehicle (6,981 words) [view diff] exact match in snippet view article find links to article
management, the controller performs various safety checks such as anomaly detection, functional safety tests and failure diagnostics. Most electric vehicles
Neptune Mission (813 words) [view diff] exact match in snippet view article find links to article
Neptune aircraft. The advent of airborne radar, sonar and magnetic anomaly detection (MAD)-equipped aircraft such as the Neptune, made for a potent counter
Fault detection and isolation (3,228 words) [view diff] case mismatch in snippet view article find links to article
Invalidation for Switched Affine Systems with Applications to Fault and Anomaly Detection**This work is supported in part by DARPA grant N66001-14-1-4045".
Primeval: New World (2,394 words) [view diff] exact match in snippet view article find links to article
his cooperation on the anomalies, but is rebuffed. Toby creates an anomaly detection system by hacking the local cell phone network, and immediately detects
Dan Blumberg (820 words) [view diff] exact match in snippet view article find links to article
other applications such homeland security, rapid response, target and anomaly detection and situational awareness. Within these studies Blumberg has been
Zia Chishti (1,791 words) [view diff] exact match in snippet view article find links to article
identification of patterns within complex data, including medical image anomaly detection, hydrocarbon detection, consumer behavioral predication and fraud
Information Processing in Medical Imaging (1,631 words) [view diff] case mismatch in snippet view article find links to article
Philipp Seeböck, Sebastian Waldstein, Georg Langs: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery 2019
Chile Ridge (4,012 words) [view diff] exact match in snippet view article find links to article
the bathymetry and magnetic profiles study, as well as the gravity anomaly detection. The Valdivia Fault Zone has caused the offset of the north and south
Incoming (1998 video game) (2,062 words) [view diff] case mismatch in snippet view article
construction of a base in the Arctic. Secret work is started on an "ADATA" (Anomaly Detection And Tracking Array) near Mount Kilimanjaro. The events of the game
Peiter Zatko (3,141 words) [view diff] case mismatch in snippet view article find links to article
at the Wayback Machine, Andy Greenberg, Forbes, November 29, 2010 "Anomaly Detection at Multiple Scales". 16 October 2011. Archived from the original on
MEMS magnetic field sensor (2,268 words) [view diff] exact match in snippet view article find links to article
nT), better sensors are required. For the application of magnetic anomaly detection, sensors at different locations have to be used to cancel the spatial-correlated
US Navy airships during World War II (1,728 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. Consolidated PBY Catalina aircraft had been searching
2004 Venezuelan recall referendum (4,952 words) [view diff] case mismatch in snippet view article find links to article
Science 26(4) Luis Raul Pericchi and David A Torres (2011), Quick Anomaly Detection by the Newcomb–Benford Law, with Applications to Electoral Processes
Boeing P-8 Poseidon (11,969 words) [view diff] exact match in snippet view article find links to article
deleted the requirement for the P-8A to be equipped with magnetic anomaly detection (MAD) equipment as a weight reduction measure, improving endurance
CAN bus (9,553 words) [view diff] exact match in snippet view article find links to article
performance. Intrusion Detection Systems (IDS): Advanced IDS and anomaly detection algorithms—often incorporating machine learning—monitor CAN traffic
Software-defined networking (6,000 words) [view diff] exact match in snippet view article find links to article
(2014). "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments". Computer Networks.
Dan Hendrycks (860 words) [view diff] case mismatch in snippet view article find links to article
Hendrycks, Dan; Mazeika, Mantas; Dietterich, Thomas (2019-01-28). "Deep Anomaly Detection with Outlier Exposure". International Conference on Learning Representations
Twitch Plays Pokémon (5,861 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 25 February 2014. A. Haque. "Unsupervised Context-Aware Anomaly Detection for Identifying Trolls in Streaming Data Archived 5 July 2022 at the
Gen Digital (8,555 words) [view diff] case mismatch in snippet view article find links to article
protect connected vehicles against zero-day attacks. The Symantec Anomaly Detection for Automotive is an IoT product for manufacturers and uses machine
CT scan (16,226 words) [view diff] case mismatch in snippet view article find links to article
spectral CT". In Greenberg JA, Gehm ME, Neifeld MA, Ashok A (eds.). Anomaly Detection and Imaging with X-Rays (ADIX) III. p. 12. doi:10.1117/12.2309663
Magnetic flux leakage (2,127 words) [view diff] exact match in snippet view article find links to article
States National Technical Information Center 1999 REMPEL, Raymond - Anomaly detection using Magnetic Flux Leakage ( MFL ) Technology - Presented at the
Alfonso Farina (1,986 words) [view diff] case mismatch in snippet view article find links to article
of the state-of-the-art Covariance-based Methods for Statistical Anomaly Detection Algorithms". Signal, Image and Video Processing. 10 (4): 687–694.
Airship (16,170 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. PBY aircraft had been searching these waters but
Self-driving car (15,647 words) [view diff] case mismatch in snippet view article find links to article
Ali; Alsini, Raed (15 July 2022). "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry. 14 (7): 1450
Government by algorithm (8,036 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, and
Smart grid (14,274 words) [view diff] case mismatch in snippet view article find links to article
Pedro Henriques (2024-05-06). "Data-Centric Federated Learning for Anomaly Detection in Smart Grids and Other Industrial Control Systems". NOMS 2024-2024
Yuval Elovici (2,673 words) [view diff] exact match in snippet view article find links to article
devices based on various techniques, such as temporal reasoning and anomaly detection. In addition, an efficient, collaborative application-monitoring scheme
Automatic identification system (11,207 words) [view diff] exact match in snippet view article find links to article
for safety and optimisation of seafaring, namely traffic analysis, anomaly detection, route extraction and prediction, collision detection, path planning
Geophysical MASINT (9,507 words) [view diff] case mismatch in snippet view article find links to article
promise, but these sensors must be fairly close to the target. Magnetic Anomaly Detection (MAD) is used in antisubmarine warfare, for final localization before
VP-44 (1951–1991) (2,217 words) [view diff] exact match in snippet view article
power and endurance, the new aircraft were supplied with magnetic anomaly detection (MAD) gear to round out the electronic capabilities of the squadron
Internet fraud prevention (3,365 words) [view diff] exact match in snippet view article find links to article
techniques, including machine-learning-based behavior analytics and anomaly detection; the use of a "fraud hub" that enables third-party data sources to
David McCarthy (academic) (1,191 words) [view diff] exact match in snippet view article
loggers and sensors. They developed new sensors, loggers, and AI anomaly detection algorithms and applied them to a smart sensor array that could detect
Data valuation (2,652 words) [view diff] exact match in snippet view article find links to article
PMID 36380246. Lee , W; Xiang, D (2001). "Information-theoretic measures for anomaly detection". Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
List of ProCurve products (1,970 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on Module
List of Primeval characters (20,578 words) [view diff] case mismatch in snippet view article find links to article
The anomaly that Christine has is normally cloaked from the ARC's Anomaly Detection Device (presumably by radio jamming on the frequency used by the detector)
List of people with epilepsy (6,413 words) [view diff] case mismatch in snippet view article find links to article
famously worked at the NSA where she created the Computer Misuse and Anomaly Detection (CMAD) Program and intrusion detection software at Los Alamos. Barry
Luís M. A. Bettencourt (1,489 words) [view diff] case mismatch in snippet view article find links to article
"Towards Real Time Epidemiology: Data Assimilation, Modeling and Anomaly Detection of Health Surveillance Data Streams". Intelligence and Security Informatics:
Cellular neural network (10,029 words) [view diff] exact match in snippet view article find links to article
infrared imagery, calorimeter cluster peak for high energy physics, anomaly detection in potential field maps for geophysics, laser dot detection, metal
Nitesh Chawla (1,597 words) [view diff] exact match in snippet view article find links to article
Chawla, N. V. (2019, July). A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings of
USS Davis (DD-937) (12,977 words) [view diff] case mismatch in snippet view article
controllers on board Davis and Fred T. Berry conducted over 1,200 Magnetic Anomaly Detection verification runs on the submarine, utilizing aircraft from Essex
RAF Coastal Command during World War II (16,504 words) [view diff] case mismatch in snippet view article find links to article
judgement by direct sighting with considerable success. Magnetic Anomaly Detection (MAD) was used to detect submerged U-boats. It consisted of a sensitive