Searched for: collection%253Air
(1 - 7 of 7)
document
Dong, Y. (author), Lu, Xingmin (author), Li, Ruohan (author), Song, Wei (author), van Arem, B. (author), Farah, H. (author)
The burgeoning navigation services using digital maps provide great convenience to drivers. However, there are sometimes anomalies in the lane rendering map images, which might mislead human drivers and result in unsafe driving. To accurately and effectively detect the anomalies, this paper transforms lane rendering image anomaly detection into...
poster 2024
document
Wang, C. (author)
The scale of the power system has been significantly expanded in recent decades. To gain real-time insights into the power system, an increasing number of sensors have been deployed tomonitor grid states, resulting in a rapidly growing number of measurement points. Simultaneously, there has also been a rise in the penetration of renewable energy...
doctoral thesis 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
The cyber attacks in Ukraine in 2015 and 2016 demonstrated the vulnerability of electrical power grids to cyber threats. They highlighted the significance of Operational Technology (OT) communication-based anomaly detection. Many anomaly detection methods are based on real-time traffic monitoring, i.e., Intrusion Detection Systems (IDS) that may...
conference paper 2023
document
Cao, C.S. (author), Blaise, Agathe (author), Verwer, S.E. (author), Rebecchi, Filippo (author)
These days more companies are shifting towards using cloud environments to provide their services to their client. While it is easy to set up a cloud environment, it is equally important to monitor the system's runtime behaviour and identify anomalous behaviours that occur during its operation. In recent years, the utilisation of Recurrent...
conference paper 2022
document
Mazidi, P. (author)
With increase in the number of sensors installed on sub-assemblies of industrial components, the amount of data collected is rapidly increasing. These data hold information in the areas of operation of the system and evolution of health condition of the components. Therefore, extracting the knowledge from the data can bring about significant...
doctoral thesis 2018
document
Bortolameotti, Riccardo (author), van Ede, Thijs (author), Caselli, Marco (author), Everts, M.H. (author), Hartel, P.H. (author), Hofstede, Rick (author), Jonker, Willem (author), Peter, A. (author)
We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype...
conference paper 2017
Searched for: collection%253Air
(1 - 7 of 7)