Search Results

There are 13542 results for: content related to: Anomaly detection and response approach based on mapping requests

  1. You have full text access to this Open Access content
    Anomaly detection in big data from UWB radars

    Security and Communication Networks

    Volume 8, Issue 14, 25 September 2015, Pages: 2469–2475, Wei Wang, Xin Zhou, Baoju Zhang and Jiasong Mu

    Version of Record online : 22 MAR 2013, DOI: 10.1002/sec.745

  2. You have full text access to this Open Access content
    An integrated detection system against false data injection attacks in the Smart Grid

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 91–109, Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai and Nada Golmie

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.957

  3. You have full text access to this Open Access content
    DWT-based anomaly detection method for cyber security of wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2911–2922, Łukasz Saganowski, Tomasz Andrysiak, Rafał Kozik and Michał Choraś

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1550

  4. You have full text access to this Open Access content
    Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  5. You have full text access to this Open Access content
    Classifying malicious activities in Honeynets using entropy and volume-based thresholds

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 567–583, Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah and Marwan Abu-Amara

    Version of Record online : 3 JUL 2012, DOI: 10.1002/sec.575

  6. You have full text access to this Open Access content
    Fast anomaly detection using Boxplot rule for multivariate data in cooperative wideband cognitive radio in the presence of jammer

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 212–219, Ahmed Moumena and Abdelrezzak Guessoum

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.974

  7. You have free access to this content
    The non-local character of turbulence asymmetry in the convective atmospheric boundary layer

    Quarterly Journal of the Royal Meteorological Society

    Volume 143, Issue 702, January 2017 Part A, Pages: 494–507, Khaled Ghannam, Tomer Duman, Scott T. Salesky, Marcelo Chamecki and Gabriel Katul

    Version of Record online : 1 DEC 2016, DOI: 10.1002/qj.2937

  8. Combining Experts: Decomposition and Aggregation Order

    Risk Analysis

    Volume 33, Issue 6, June 2013, Pages: 1116–1127, Erin Baker and Olaitan Olaleye

    Version of Record online : 12 DEC 2012, DOI: 10.1111/j.1539-6924.2012.01937.x

  9. Endogenous Mergers and Collusion in Asymmetric Market Structures

    Economica

    Volume 79, Issue 316, October 2012, Pages: 766–791, Mattias Ganslandt, Lars Persson and Helder Vasconcelos

    Version of Record online : 12 JUL 2012, DOI: 10.1111/j.1468-0335.2012.00937.x

  10. Probabilistic slow feature analysis-based representation learning from massive process data for soft sensor modeling

    AIChE Journal

    Volume 61, Issue 12, December 2015, Pages: 4126–4139, Chao Shang, Biao Huang, Fan Yang and Dexian Huang

    Version of Record online : 18 JUL 2015, DOI: 10.1002/aic.14937

  11. You have full text access to this Open Access content
    Feature engineering for detection of Denial of Service attacks in session initiation protocol

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1587–1601, Hassan Asgharian, Ahmad Akbari and Bijan Raahemi

    Version of Record online : 1 SEP 2014, DOI: 10.1002/sec.1106

  12. You have full text access to this Open Access content
    A data mining system for distributed abnormal event detection in backbone networks

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 904–913, Yingjie Zhou, Guangmin Hu and Dapeng Wu

    Version of Record online : 17 MAY 2013, DOI: 10.1002/sec.801

  13. You have full text access to this Open Access content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  14. You have full text access to this Open Access content
    A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  15. You have full text access to this Open Access content
    Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2750–2767, Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.603

  16. You have full text access to this Open Access content
    Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.591

  17. You have full text access to this Open Access content
    Towards reducing false alarms in network intrusion detection systems with data summarization technique

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 275–285, Neminath Hubballi, Santosh Biswas and Sukumar Nandi

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.562

  18. You have full text access to this Open Access content
    Evolutionary-based packets classification for anomaly detection in web layer

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2901–2910, Rafał Kozik, Michał Choraś and Witold Hołubowicz

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1549

  19. You have full text access to this Open Access content
    An efficient intrusion detection framework in cluster-based wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1211–1224, Hichem Sedjelmaci, Sidi Mohammed Senouci and Mohammed Feham

    Version of Record online : 30 JAN 2013, DOI: 10.1002/sec.687

  20. You have full text access to this Open Access content
    Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 248–261, Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.544