Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Anomaly Detection at Multiple Scales (view), Network behavior anomaly detection (view)

searching for Anomaly detection 130 found (376 total)

alternate case: anomaly detection

Magnetic anomaly detector (805 words) [view diff] case mismatch in snippet view article find links to article

Wang, Siwei; Chen, Dixiang; Hu, Jingtao; Pan, Xue (2019). "Magnetic Anomaly Detection Based on Full Connected Neural Network". IEEE Access. 7. IEEE: 182198
Global Maritime Situational Awareness (463 words) [view diff] exact match in snippet view article find links to article
"Maritime anomaly detection" returns a large number of hits from a wide range of domains. Some of the related topics are: Maritime anomaly detection and situation
Anomaly-based intrusion detection system (554 words) [view diff] exact match in snippet view article find links to article
recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors
ML.NET (1,606 words) [view diff] exact match in snippet view article find links to article
multi-class classification, and regression tasks. Additional ML tasks like anomaly detection and recommendation systems have since been added, and other approaches
Anti-submarine weapon (3,990 words) [view diff] case mismatch in snippet view article find links to article
anti-submarine forces also began employing autogyro aircraft and Magnetic Anomaly Detection (MAD) equipment to sink U.S. subs, particularly those plying major
NetQoS (308 words) [view diff] case mismatch in snippet view article find links to article
company was acquired by CA Technologies include: Performance Center Anomaly Detection Network latency calculator Earlier offerings include: SuperAgent a
Tracing (software) (1,312 words) [view diff] exact match in snippet view article
fall into a terminological gray area. Tracing is primarily used for anomaly detection, fault analysis, debugging or diagnostic purposes in distributed software
Anodot (725 words) [view diff] exact match in snippet view article find links to article
learning and artificial intelligence for business monitoring and anomaly detection. Anodot was founded in 2014 by David Drai along with Ira Cohen, former
Mark Burgess (computer scientist) (2,268 words) [view diff] exact match in snippet view article
the proof of concept platform using these methods for system state anomaly detection, from 2002 to the present, and received widespread use. Based on these
Automated X-ray inspection (1,386 words) [view diff] exact match in snippet view article find links to article
of the inspection are used to optimize following processing steps, Anomaly detection, i.e. the result of the inspection serve as a criterion to reject
Comparison of cognitive architectures (143 words) [view diff] exact match in snippet view article find links to article
Hierarchical Temporal Memory connectionist online learning, anomaly detection ? anomaly detection active 2009 Hawkins et al (multiple) AGPL LIDA symbolic
Rebecca Bace (935 words) [view diff] case mismatch in snippet view article find links to article
National Security Agency where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computer
RoboNet (472 words) [view diff] exact match in snippet view article find links to article
2008, RoboNet-II has been using the expert system for microlensing anomaly detection that is being provided by the Automated Robotic Terrestrial Exoplanet
Sematext (145 words) [view diff] exact match in snippet view article find links to article
on-premises systems for application performance monitoring, alerting, anomaly detection, centralized logging, logging management, analytics, and real user
Argus – Audit Record Generation and Utilization System (916 words) [view diff] case mismatch in snippet view article find links to article
traffic measurement data for network forensics and Network Behavior Anomaly Detection (NBAD). Argus has been used extensively in cybersecurity, end-to-end
Anderson function (762 words) [view diff] exact match in snippet view article find links to article
along an arbitrary line. They are useful in the study of magnetic anomaly detection, with historical applications in submarine hunting and underwater
Jugal Kalita (186 words) [view diff] case mismatch in snippet view article find links to article
for Students and Professionals, 2003, Universal Publishers Network Anomaly Detection: A Machine Learning Perspective, with Dhruba K. Bhattacharyya, 2013
Flowmon Networks (631 words) [view diff] exact match in snippet view article find links to article
probes and collectors by analytical features for network behavior anomaly detection, network awareness application performance management, DDoS detection
Medoid (4,000 words) [view diff] exact match in snippet view article find links to article
identifying anomalies, and one efficient method is through cluster-based anomaly detection. They can be used to discover clusters of data points that deviate
Vir Phoha (787 words) [view diff] exact match in snippet view article find links to article
research focuses on attack-averse authentication, spoof-resistance, anomaly detection, machine learning, optimized attack formulation, and spatial-temporal
Diffusion map (2,469 words) [view diff] exact match in snippet view article find links to article
speaker verification and identification, sampling on manifolds, anomaly detection, image inpainting, revealing brain resting state networks organization
Abiodun Musa Aibinu (894 words) [view diff] case mismatch in snippet view article find links to article
Matters. Performance Evaluation of You Only Look Once v4 in Road Anomaly Detection and Visual Simultaneous Localisation and Mapping for Autonomous Vehicles
Dasient (407 words) [view diff] exact match in snippet view article find links to article
behavioral-based engine - based on sophisticated algorithms and anomaly detection technology - to defend against the latest attacks using up-to-date
OpenText Data Protector (550 words) [view diff] case mismatch in snippet view article find links to article
additional security features like Multi-Factor Authentication and Anomaly Detection have been added. Today's version of Data Protector provides full backwards
Data lineage (5,906 words) [view diff] no match in snippet view article find links to article
Data Lineage refers to the process of tracking how data is generated, transformed, transmitted, and used across a system over time. It documents the origins
Dhruba K. Bhattacharyya (343 words) [view diff] case mismatch in snippet view article find links to article
is the vice-chancellor (in-charge) of Tezpur University. Network Anomaly Detection: A Machine Learning Perspective, with Jugal K Kalita, 2013, CRC Press
HSM-49 (818 words) [view diff] case mismatch in snippet view article find links to article
advanced airborne active sonar. It is not equipped with the Magnetic Anomaly Detection (MAD) that the SH-60B employed. Pilot instrumentation is provided
Zeek (645 words) [view diff] exact match in snippet view article find links to article
another Zeek script. Zeek analyzers perform application layer decoding, anomaly detection, signature matching and connection analysis. Zeek's developers designed
Prognostics (3,833 words) [view diff] exact match in snippet view article find links to article
configure and customize the algorithms for signature extraction, anomaly detection, health assessment, failure diagnosis, and failure prediction for
Election forensics (742 words) [view diff] exact match in snippet view article find links to article
forensics: Using machine learning and synthetic data for possible election anomaly detection". PLOS ONE. 14 (10): e0223950. Bibcode:2019PLoSO..1423950Z. doi:10
Security visualisation (511 words) [view diff] exact match in snippet view article find links to article
varying shades and patterns of color gradient. ELISHA is a visual anomaly detection system. The tool aims at identifying multiple origin autonomous system
DHS Border and Maritime Security Division (371 words) [view diff] exact match in snippet view article find links to article
examination by non-intrusive inspection Increased information fusion, anomaly detection, Automatic Target Recognition capability Detect and identify WMD materials
Wireless sensor network (6,401 words) [view diff] exact match in snippet view article find links to article
use. This technique has been used, for instance, for distributed anomaly detection or distributed optimization. As nodes can inspect the data they forward
3 Corner Satellite (452 words) [view diff] exact match in snippet view article find links to article
Execution and Replanning (CASPER) software, and Context-sensitive anomaly detection software (SELMON monitoring system) NASA Jet Propulsion Laboratory
Dorothy E. Denning (2,198 words) [view diff] exact match in snippet view article find links to article
developed an intrusion detection system (IDS) model using statistics for anomaly detection that is still the basis for intrusion detection systems today. SRI's
K-class blimp (2,481 words) [view diff] exact match in snippet view article find links to article
had a detection range of 90 mi (140 km), sonobuoys, and magnetic anomaly detection (MAD) equipment. The K-ships carried four 350 lb (160 kg) depth bombs
Lockheed P-3 Orion (11,266 words) [view diff] exact match in snippet view article find links to article
its distinctive tail stinger or "MAD" boom, used for the magnetic anomaly detection (MAD) of submarines. Over the years, the P-3 has seen numerous design
Cyber threat intelligence (2,393 words) [view diff] case mismatch in snippet view article find links to article
A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection". 2019 IEEE Conference on Communications and Network Security (CNS)
Kenitra Air Base (772 words) [view diff] exact match in snippet view article find links to article
shallow waters of the Straits of Gibraltar where radar and magnetic anomaly detection were viable. Craw Field was the final destination of the six K-ships
Airborne Real-time Cueing Hyperspectral Enhanced Reconnaissance (3,022 words) [view diff] exact match in snippet view article find links to article
matching where reflected light is matched to spectral signatures anomaly detection using a statistical model of the pixels in the image to determine
List of weapons of the Japanese Navy (1,687 words) [view diff] exact match in snippet view article find links to article
Kawanishi E7K2 ("Alf") Mark 2: short range seaplane, fitted with magnetic anomaly detection equipment and surface-search radar for short range patrol and antisubmarine
OSSIM (842 words) [view diff] exact match in snippet view article find links to article
address anomaly detection, replaced by PRADS. P0f, used for passive OS detection and OS change analysis, replaced by PRADS. PADS, used for service anomaly detection
Allot Ltd. (1,268 words) [view diff] case mismatch in snippet view article find links to article
Regulatory Compliance QoE & Application Control Web Security Behavior Anomaly Detection Revenue US$ 146 million (2021) Total equity US$ 126 million (2021)
Naval aircrewman (2,266 words) [view diff] exact match in snippet view article find links to article
electronic warfare, active and passive sonar. Reading sonograms, magnetic anomaly detection equipment, physics, wave propagation, oceanography, meteorology and
Packet capture appliance (1,943 words) [view diff] exact match in snippet view article find links to article
techniques for network intrusion detection, traffic classification, and anomaly detection are used to identify potentially malicious traffic for collection
Real-time outbreak and disease surveillance (260 words) [view diff] case mismatch in snippet view article find links to article
Challenges Facing Early Outbreak Detection in Biosurveillance", Technometrics (Special Issue on Anomaly Detection), vol. 52, issue 1, pp. 39–51, 2010 v t e
Anti-submarine warfare (7,726 words) [view diff] exact match in snippet view article find links to article
surprise and attack enemy submarines on the surface at night. Magnetic anomaly detection Diesel exhaust sniffers Sonobuoys Weaponry Depth charges, the most
Call graph (1,566 words) [view diff] exact match in snippet view article find links to article
Dawn (25 October 2004). "Gray-box extraction of execution graphs for anomaly detection". Proceedings of the 11th ACM conference on Computer and communications
Degaussing (2,919 words) [view diff] exact match in snippet view article find links to article
facilitate the detection of a submarine by ships or aircraft with magnetic anomaly detection (MAD) equipment. Navies use the deperming procedure, in conjunction
Thomas G. Dietterich (2,777 words) [view diff] case mismatch in snippet view article find links to article
Dietterich, Shubhomoy Das (2016). Finite Sample Complexity of Rare Pattern Anomaly Detection. Uncertainty in Artificial Intelligence (UAI-2016). New York, NY Alkaee-Taleghan
Mod qos (826 words) [view diff] exact match in snippet view article find links to article
upload/download throughput a client must generate. September 2009, Version 9: Anomaly detection using client characteristic measurement. February 2012, Version 10:
Military helicopter (3,142 words) [view diff] exact match in snippet view article find links to article
King, to be equipped with integral dunking sonar, radar and magnetic anomaly detection equipment. The result was an aircraft able to more quickly respond
Webroot (1,829 words) [view diff] exact match in snippet view article find links to article
of CyberFlow Analytics, a company applying data science to network anomaly detection. In February 2019 Webroot announced that it would be acquired by Carbonite
CFEngine (1,180 words) [view diff] exact match in snippet view article find links to article
re-write, CFEngine 2, which added features for machine learning, anomaly detection and secure communications. Between 1998 and 2004, CFEngine grew in
Webist (1,815 words) [view diff] case mismatch in snippet view article find links to article
Antti Juvonen. "GROWING HIERARCHICAL SELF-ORGANISING MAPS FOR ONLINE ANOMALY DETECTION BY USING NETWORK LOGS" Proceedings - Proceedings of the 7th International
Naval Station Argentia (2,407 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and PB4Y-2) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Strait
Sense Networks (807 words) [view diff] case mismatch in snippet view article find links to article
Spatial-Temporal Trails in Location Analytics (US 20100079336), and Anomaly Detection in Sensor Analytics (US 20100082301). The company was acquired by
Naval Station Argentia (2,407 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and PB4Y-2) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Strait
Honeytoken (469 words) [view diff] case mismatch in snippet view article find links to article
PMC 9185350. PMID 35684744. DLP and honeytokens IDS: RES: Protocol Anomaly Detection IDS – Honeypots Has my mailing list been stolen? | Plynt Security
IoBT-CRA (706 words) [view diff] exact match in snippet view article find links to article
tasks such as information collection, predictive processing, and data anomaly detection. Security: Methods of increasing the defenses of IoBTs such that the
Douglas B-18 Bolo (3,092 words) [view diff] exact match in snippet view article find links to article
bombardier was replaced by a search radar with a large radome. Magnetic anomaly detection (MAD) equipment was sometimes housed in a tail boom. These aircraft
NetMiner (803 words) [view diff] case mismatch in snippet view article find links to article
Two mode analysis modules and Mining(Classification, Regression, Anomaly Detection, Frequent Subgraph etc.) was added (Version: 4.2.0) Morphological
Kansas Geological Survey (1,994 words) [view diff] no match in snippet view article find links to article
to advance the research and development of an automated subterrain anomaly-detection system using active seismic-imaging (ASI) technologies to be used
Hyper-surveillance (1,095 words) [view diff] exact match in snippet view article find links to article
Zhang, Y.; Li, M.; Dong, Z. Y.; Meng, K. (June 2019). "Probabilistic anomaly detection approach for data-driven wind turbine condition monitoring". CSEE
Shared Whois Project (397 words) [view diff] case mismatch in snippet view article find links to article
Gleichmann; Doug Montgomery (2009). "A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms". 2009 Cybersecurity Applications & Technology
Lastline (919 words) [view diff] case mismatch in snippet view article find links to article
security Countermeasure (computer) IT risk Malware Network Behavior Anomaly Detection Threat (computer) Yokwicz, Will Watching the (Digital) Detectives
Glassbox (1,240 words) [view diff] exact match in snippet view article find links to article
and churn prediction, real-time fraud detection and prevention, and anomaly detection systems, and they could help enterprise clients anticipate issues
Sea anemone (4,674 words) [view diff] case mismatch in snippet view article find links to article
Bojani (2011). Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer Science & Business
Breakthrough Listen (3,505 words) [view diff] case mismatch in snippet view article find links to article
Seung Woo Son; Andrew Siemion; Steve Croft (2019). "Self-Supervised Anomaly Detection for Narrowband SETI". arXiv:1901.04636 [astro-ph.IM]. "Open Data"
Turbomachinery (2,486 words) [view diff] case mismatch in snippet view article find links to article
Support Vector Machines and Segmentation Algorithms for Efficient Anomaly Detection: A Petroleum Industry Application". International Joint Conference
Shaanxi Y-8 (3,115 words) [view diff] exact match in snippet view article find links to article
air-to-surface search radar, a side-looking ISAR radar and a magnetic anomaly detection tube. Y-8EW: New EW aircraft. Y-8 Gunship: A projected gunship version
Peter Tippett (1,204 words) [view diff] exact match in snippet view article find links to article
image signatures, using hash-tables for trusted file execution and anomaly detection, aspects of mail merge and "un-do." He ran a bulletin board system
The Signpost (4,307 words) [view diff] exact match in snippet view article find links to article
2016. Yan, Guanhua; Arackaparambil, Chrisil (2011). "Wiki-watchdog: Anomaly detection in Wikipedia through a distributional lens". Proceedings of the 2011
SKYNET (surveillance program) (450 words) [view diff] exact match in snippet view article
statistical discrepancies with behavioral abnormalities and that the anomaly detection methodology SKYNET perpetuates the self/other binary. For example
Concept drift (2,897 words) [view diff] exact match in snippet view article find links to article
Numenta Anomaly Benchmark, benchmark for evaluating algorithms for anomaly detection in streaming, real-time applications. (2014–2018) 2014 [] Special
Social media measurement (1,934 words) [view diff] exact match in snippet view article find links to article
S2CID 13987132. Wang, Wei (2011). "Network traffic monitoring, analysis and anomaly detection [Guest Editorial]". IEEE Network. 25 (3): 6–7. doi:10.1109/mnet.2011
Wei Wang (computer scientist) (721 words) [view diff] case mismatch in snippet view article
pp. 197–206, 2018. NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks, by Wenchao Yu, Wei Cheng, Charu Aggarwal, Kai
List of spatial analysis software (98 words) [view diff] exact match in snippet view article find links to article
geo-triggered events, dynamic and complex route calculations and automated anomaly detection are just a mouse click away. Independent benchmark tests by academia
Cyber Assessment Framework (307 words) [view diff] exact match in snippet view article find links to article
Objective C: Detecting cyber security events C.1 Security monitoring C.2 Anomaly detection Objective D: Minimising the impact of cyber security incidents D.1
Cohesity (1,629 words) [view diff] exact match in snippet view article find links to article
provides anti-ransomware features including machine learning-based anomaly detection. Through the acquisition of Imanis Data in 2019, Cohesity extended
Battery electric vehicle (4,775 words) [view diff] exact match in snippet view article find links to article
management, the controller performs various safety checks such as anomaly detection, functional safety tests and failure diagnostics. Most electric vehicles
HMS Wishart (2,909 words) [view diff] exact match in snippet view article find links to article
Navy PBY Catalina aircraft of Patrol Squadron 63 using magnetic anomaly detection equipment detected the German submarine U-761 near Tangier while U-761
Portugal during World War II (5,581 words) [view diff] exact match in snippet view article find links to article
of German U-boats around the Straits of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from Weeksville
Lajes Field (4,101 words) [view diff] exact match in snippet view article find links to article
for German U-boats around the Strait of Gibraltar using magnetic anomaly detection (MAD). In 1945, two ZP-14 replacement blimps were sent from Weeksville
Naval Air Station South Weymouth (3,568 words) [view diff] exact match in snippet view article find links to article
missions flown by FAW-15 aircraft (PBYs and B-24s) using magnetic anomaly detection to locate U-boats in the relatively shallow waters around the Straits
Neptune Mission (813 words) [view diff] exact match in snippet view article find links to article
Neptune aircraft. The advent of airborne radar, sonar and magnetic anomaly detection (MAD)-equipped aircraft such as the Neptune, made for a potent counter
IBM System Management Facilities (1,359 words) [view diff] exact match in snippet view article find links to article
log-based and metric-based machine learning technology to provide anomaly detection. IBM Db2 Analytics Accelerator for z/OS, a database application that
Krishnendu Chakrabarty (795 words) [view diff] case mismatch in snippet view article find links to article
for his paper "Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques." He also received the 2021 Vitold Belevitch Award for
Small Satellite Research Laboratory (1,188 words) [view diff] exact match in snippet view article find links to article
from motion, surface reconstruction, data compression, and oceanic anomaly detection. UGA Small Satellite Research Laboratory Team and History "Dean's
Underwater searches (10,671 words) [view diff] exact match in snippet view article find links to article
ships. Air searches can be done for magnetic targets using magnetic anomaly detection (MAD) systems, which use a sensitive magnetometer carried by an aircraft
Vishal Monga (773 words) [view diff] case mismatch in snippet view article find links to article
in Color Image Processing: Methods and Applications (2006) "Video Anomaly Detection" in Computer Vision and Imaging in Intelligent Transportation Systems
VP-5 (4,904 words) [view diff] exact match in snippet view article find links to article
1948 VP-ML-5 received the first P2V Neptune, equipped with magnetic anomaly detection (MAD) equipment capable of detecting large magnetic objects underwater
Cheating in online games (6,028 words) [view diff] no match in snippet view article find links to article
On online games, cheating subverts the rules or mechanics of the games to gain an unfair advantage over other players, generally with the use of third-party
Fault detection and isolation (3,228 words) [view diff] case mismatch in snippet view article find links to article
Invalidation for Switched Affine Systems with Applications to Fault and Anomaly Detection**This work is supported in part by DARPA grant N66001-14-1-4045".
Dan Hendrycks (671 words) [view diff] case mismatch in snippet view article find links to article
Hendrycks, Dan; Mazeika, Mantas; Dietterich, Thomas (2019-01-28). "Deep Anomaly Detection with Outlier Exposure". International Conference on Learning Representations
Primeval: New World (2,391 words) [view diff] exact match in snippet view article find links to article
his cooperation on the anomalies, but is rebuffed. Toby creates an anomaly detection system by hacking the local cell phone network, and immediately detects
Peiter Zatko (3,139 words) [view diff] case mismatch in snippet view article find links to article
at the Wayback Machine, Andy Greenberg, Forbes, November 29, 2010 "Anomaly Detection at Multiple Scales". 16 October 2011. Archived from the original on
Closed-circuit television (9,183 words) [view diff] exact match in snippet view article find links to article
enabling features such as object detection, behavior analysis, and anomaly detection.[citation needed] These systems reduce false alarms by distinguishing
Chile Ridge (4,012 words) [view diff] exact match in snippet view article find links to article
the bathymetry and magnetic profiles study, as well as the gravity anomaly detection. The Valdivia Fault Zone has caused the offset of the north and south
MEMS magnetic field sensor (2,268 words) [view diff] exact match in snippet view article find links to article
nT), better sensors are required. For the application of magnetic anomaly detection, sensors at different locations have to be used to cancel the spatial-correlated
Dan Blumberg (817 words) [view diff] exact match in snippet view article find links to article
other applications such homeland security, rapid response, target and anomaly detection and situational awareness. Within these studies Blumberg has been
Information Processing in Medical Imaging (1,631 words) [view diff] case mismatch in snippet view article find links to article
Philipp Seeböck, Sebastian Waldstein, Georg Langs: Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery 2019
Incoming (1998 video game) (2,050 words) [view diff] case mismatch in snippet view article
construction of a base in the Arctic. Secret work is started on an "ADATA" (Anomaly Detection And Tracking Array) near Mount Kilimanjaro. The events of the game
Software-defined networking (6,154 words) [view diff] exact match in snippet view article find links to article
(2014). "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments". Computer Networks.
Zia Chishti (1,616 words) [view diff] exact match in snippet view article find links to article
identification of patterns within complex data, including medical image anomaly detection, hydrocarbon detection, consumer behavioral predication and fraud
2004 Venezuelan recall referendum (4,936 words) [view diff] case mismatch in snippet view article find links to article
Science 26(4) Luis Raul Pericchi and David A Torres (2011), Quick Anomaly Detection by the Newcomb–Benford Law, with Applications to Electoral Processes
Gen Digital (8,066 words) [view diff] case mismatch in snippet view article find links to article
protect connected vehicles against zero-day attacks. The Symantec Anomaly Detection for Automotive is an IoT product for manufacturers and uses machine
US Navy airships during World War II (1,750 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. Consolidated PBY Catalina aircraft had been searching
CT scan (16,193 words) [view diff] case mismatch in snippet view article find links to article
spectral CT". In Greenberg JA, Gehm ME, Neifeld MA, Ashok A (eds.). Anomaly Detection and Imaging with X-Rays (ADIX) III. p. 12. doi:10.1117/12.2309663
Twitch Plays Pokémon (5,753 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 25 February 2014. A. Haque. "Unsupervised Context-Aware Anomaly Detection for Identifying Trolls in Streaming Data Archived 5 July 2022 at the
Boeing P-8 Poseidon (11,950 words) [view diff] exact match in snippet view article find links to article
deleted the requirement for the P-8A to be equipped with magnetic anomaly detection (MAD) equipment as a weight reduction measure, improving endurance
Airship (15,951 words) [view diff] exact match in snippet view article find links to article
relatively shallow waters around the Strait of Gibraltar where magnetic anomaly detection (MAD) was viable. PBY aircraft had been searching these waters but
Magnetic flux leakage (2,144 words) [view diff] exact match in snippet view article find links to article
States National Technical Information Center 1999 REMPEL, Raymond - Anomaly detection using Magnetic Flux Leakage ( MFL ) Technology - Presented at the
Self-driving car (15,458 words) [view diff] case mismatch in snippet view article find links to article
Ali; Alsini, Raed (15 July 2022). "Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model". Symmetry. 14 (7): 1450
Alfonso Farina (1,956 words) [view diff] case mismatch in snippet view article find links to article
of the state-of-the-art Covariance-based Methods for Statistical Anomaly Detection Algorithms". Signal, Image and Video Processing. 10 (4): 687–694.
Government by algorithm (7,946 words) [view diff] case mismatch in snippet view article find links to article
Ross, Matthew P.; Borghetti, Brett J. (November 2012). "A Review of Anomaly Detection in Automated Surveillance". IEEE Transactions on Systems, Man, and
Smart grid (14,189 words) [view diff] case mismatch in snippet view article find links to article
Pedro Henriques (2024-05-06). "Data-Centric Federated Learning for Anomaly Detection in Smart Grids and Other Industrial Control Systems". NOMS 2024-2024
VP-44 (1951–1991) (2,181 words) [view diff] exact match in snippet view article
power and endurance, the new aircraft were supplied with magnetic anomaly detection (MAD) gear to round out the electronic capabilities of the squadron
Yuval Elovici (2,670 words) [view diff] exact match in snippet view article find links to article
devices based on various techniques, such as temporal reasoning and anomaly detection. In addition, an efficient, collaborative application-monitoring scheme
Geophysical MASINT (9,515 words) [view diff] case mismatch in snippet view article find links to article
promise, but these sensors must be fairly close to the target. Magnetic Anomaly Detection (MAD) is used in antisubmarine warfare, for final localization before
Internet fraud prevention (3,345 words) [view diff] exact match in snippet view article find links to article
techniques, including machine-learning-based behavior analytics and anomaly detection; the use of a "fraud hub" that enables third-party data sources to
List of Primeval characters (20,578 words) [view diff] case mismatch in snippet view article find links to article
The anomaly that Christine has is normally cloaked from the ARC's Anomaly Detection Device (presumably by radio jamming on the frequency used by the detector)
Data valuation (2,652 words) [view diff] exact match in snippet view article find links to article
PMID 36380246. Lee , W; Xiang, D (2001). "Information-theoretic measures for anomaly detection". Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
List of ProCurve products (1,961 words) [view diff] case mismatch in snippet view article find links to article
above; contains Intranet Intrusion Detection and Network Behavior Anomaly Detection (NBAD) using sFlow PMM (ProCurve Mobility Manager) - Add-on Module
Luís M. A. Bettencourt (1,490 words) [view diff] case mismatch in snippet view article find links to article
"Towards Real Time Epidemiology: Data Assimilation, Modeling and Anomaly Detection of Health Surveillance Data Streams". Intelligence and Security Informatics:
Cellular neural network (10,029 words) [view diff] exact match in snippet view article find links to article
infrared imagery, calorimeter cluster peak for high energy physics, anomaly detection in potential field maps for geophysics, laser dot detection, metal
Nitesh Chawla (1,589 words) [view diff] exact match in snippet view article find links to article
Chawla, N. V. (2019, July). A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings of
USS Davis (DD-937) (12,990 words) [view diff] case mismatch in snippet view article
controllers on board Davis and Fred T. Berry conducted over 1,200 Magnetic Anomaly Detection verification runs on the submarine, utilizing aircraft from Essex
RAF Coastal Command during World War II (16,504 words) [view diff] case mismatch in snippet view article find links to article
judgement by direct sighting with considerable success. Magnetic Anomaly Detection (MAD) was used to detect submerged U-boats. It consisted of a sensitive
David McCarthy (academic) (2,899 words) [view diff] exact match in snippet view article
loggers and sensors. They developed new sensors, loggers, and AI anomaly detection algorithms and applied them to a smart sensor array that could detect