Searched for: subject:"anomaly%5C+detection"
(1 - 11 of 11)
document
de Nie, Rob (author)
The aim of this project was to develop an automated tool which can help monitoring agents to identify abnormal building behaviour by making use of the electricity master meter data. One of the most important requirements for this project was that a regression model is the starting point of the automated tool. Therefore, it was decided that, with...
master thesis 2018
document
Helmiriawan, Helmi (author)
Modern refineries typically use a high number of sensors that generate an enormous amount of data about the condition of the plants. This generated data can be used to perform predictive maintenance, an approach to predict impending failures and mitigate downtime in refineries. This research analyzes the scalability of machine learning methods...
master thesis 2018
document
Lan, Yikai (author)
Monitoring the release logs of modern online software is a challenging topic because of the enormous amount of release logs and the complicated release process. The goal of this thesis is to develop a pipeline that can monitor the release logs and find anomalous logs, automating this step with anomaly detection and reducing the required manual...
master thesis 2018
document
Mairet, Valentine (author)
The evolution of the cyber threat landscape drives companies towards state-of-the-art security monitoring techniques. Adyen, a payment service provider company, has both legal and moral obligations to perform security monitoring within the company to remain an ethical and sustainable business. The challenge is to uncover a well-founded solution...
master thesis 2018
document
Mahabir, Ashvant (author)
Graphs are used to model irregular data structures and serve as models to represent/capture the interrelationships between data. The data in graphs are also referred as graph signals. Graph signal processing (GSP) can then be applied which basically extends classical signal processing to solve problems. Anomaly detection is an example of such a...
master thesis 2017
document
Anastasakis, Michael (author)
Nowadays, organization networks are facing an increased number of different attacks and existing intrusion and anomaly detection systems fail to keep up. By focusing on security policies, malicious signatures or generic network characteristics, existing systems are not able to cover the full landscape of attacks. In this thesis we try to tackle...
master thesis 2017
document
Lion, W.F. (author)
This thesis investigates the opportunity to use the massive amounts of data coming from modern aircraft to predict maintenance tasks. The goal is to predict defects in such a fashion as to prevent the actual failure from occurring. This results in fewer delays and less maintenance costs. The aircraft data, ACMS data, is analysed using three...
master thesis 2016
document
Sæmundsson, G.D. (author)
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber attacks in an organisational environment. Anomaly detection has been an active research area for almost three decades with promising results. However, few such systems have been successfully im- plemented in an operational environment for improving...
master thesis 2015
document
Wijnands, K.J. (author)
In the last years the impact of malware has become a huge problem. Each year, more and more new malware samples are discovered [2]. And the malware is becoming more sophisticated, for example ransomware. Ransomware encrypts personal documents, such as photos and word documents, and asks money to be able to decrypt these files, hence the name....
master thesis 2015
document
Selman, H.S. (author)
Nowadays, a high number of transactions are performed via internet banking. Rabobank processes more than 10 million transactions per day. Most of these transactions are (part of) normal behaviour. On the other hand, some transactions are considered to be out of the ordinary. These anomalous events occur relatively infrequently (less than 10 per...
master thesis 2015
document
Siadis, J. (author)
Checking the execution behaviour of continuous running software systems is a critical task, to validate if the system is behaving as expected. In order to facilitate this process, many companies from the industry utilize log mechanisms to record events of interest and analyze the data in a post-mortem fashion. However, employing logging...
master thesis 2013
Searched for: subject:"anomaly%5C+detection"
(1 - 11 of 11)