Two effective anomaly correction methods in embedded systems
暂无分享,去创建一个
[1] Jonathan D. Cryer,et al. Time Series Analysis , 1986 .
[2] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[3] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[4] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[5] Alberto Sangiovanni-Vincentelli,et al. An embedded system for an eye-detection sensor , 2005, Comput. Vis. Image Underst..
[6] Andrea Torsello,et al. Similarity-Based Pattern Recognition , 2006, Lecture Notes in Computer Science.
[7] Navdeep Singh,et al. A Survey of Intrusion Detection Techniques , 2013 .
[8] P. Sajda,et al. Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).
[9] Hamid R. Zarandi,et al. Two effective methods to detect anomalies in embedded systems , 2012, Microelectron. J..
[10] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[11] Arnaud Virazel,et al. Error Resilient Infrastructure for Data Transfer in a Distributed Neutron Detector , 2011, 2011 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems.
[12] Jeff G. Schneider,et al. Detecting anomalous records in categorical datasets , 2007, KDD '07.
[13] Youngju Kim,et al. Amorphous Slack Methodology for Autonomous Fault-Handling in Reconfigurable Devices , 2012 .
[14] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[15] Ernesto Araujo,et al. Fuzzy Decision in Airplane Speed Control , 2006, 2006 IEEE International Conference on Fuzzy Systems.
[16] Himanshu Bhatnagar. Advanced ASIC Chip Synthesis: Using Synopsys' Design Compiler and PrimeTime , 1999 .
[17] Joseph B. Evans,et al. Anomaly Detection with Sensor Data for Distributed Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[18] Himanshu Bhatnagar. Advanced ASIC Chip Synthesis: Using Synopsys Design Compiler Physical Compiler and Prime Time , 2002 .
[19] Eyal Amir,et al. Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .
[20] Kymie M. C. Tan,et al. Anomaly Detection in Embedded Systems , 2002, IEEE Trans. Computers.
[21] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.