Searched for: subject%3A%22Anomaly%255C+detection%22
(81 - 87 of 87)

Pages

document
Spruit, R. (author), Van Tol, F. (author), Broere, W. (author)
If a calamity with a retaining wall occurs, the impact on surrounding buildings and infrastructure is at least an order of magnitude more severe than without the calamity. In 2005 and 2006 major leaks in the retaining walls of underground stations in Amsterdam and Rotterdam occurred. After these cases had been thoroughly studied it was concluded...
conference paper 2015
document
Sæmundsson, G.D. (author)
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber attacks in an organisational environment. Anomaly detection has been an active research area for almost three decades with promising results. However, few such systems have been successfully im- plemented in an operational environment for improving...
master thesis 2015
document
Wijnands, K.J. (author)
In the last years the impact of malware has become a huge problem. Each year, more and more new malware samples are discovered [2]. And the malware is becoming more sophisticated, for example ransomware. Ransomware encrypts personal documents, such as photos and word documents, and asks money to be able to decrypt these files, hence the name....
master thesis 2015
document
Selman, H.S. (author)
Nowadays, a high number of transactions are performed via internet banking. Rabobank processes more than 10 million transactions per day. Most of these transactions are (part of) normal behaviour. On the other hand, some transactions are considered to be out of the ordinary. These anomalous events occur relatively infrequently (less than 10 per...
master thesis 2015
document
Cai, Y. (author), Liu, Z. (author)
According to the COLREGs, every Officer On Watch (OOW) shall at all times maintain a proper look-out. Among all the available means of look-out, sight is the most basic and commonly used one. OOWs always need to make a full appraisal of the situation and of the risk of collision by sight, including estimating the range and bearing. Unlike the...
conference paper 2013
document
Siadis, J. (author)
Checking the execution behaviour of continuous running software systems is a critical task, to validate if the system is behaving as expected. In order to facilitate this process, many companies from the industry utilize log mechanisms to record events of interest and analyze the data in a post-mortem fashion. However, employing logging...
master thesis 2013
document
Bakker, M. (author), Lapikas, T. (author), Tangena, B.H. (author), Vreeburg, J.H.G. (author)
Water supply systems are vulnerable to damage caused by unintended or intended human actions, or due to aging of the system. In order to minimize the damages and the inconvenience for the customers, a software tool was developed to detect anomalies at an early stage, and to support the responsible staff in taking the right decisions to restore...
conference paper 2012
Searched for: subject%3A%22Anomaly%255C+detection%22
(81 - 87 of 87)

Pages