Anomaly detection for mobile devices in industrial internet
Abstract
References
Recommendations
Bayesian-Based Industrial Internet Service Abnormal Detection Algorithm
ICITEE '19: Proceedings of the 2nd International Conference on Information Technologies and Electrical EngineeringThe large and complex nature of the industrial Internet has led to a large amount of attack information in network traffic, and network attacks will cause network traffic anomalies. How to quickly and accurately detect network traffic anomalies and ...
State-aware anomaly detection for industrial control systems
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied ComputingAnomaly detection for industrial control systems (ICS) can leverage process data to detect malicious derivations from expected process behavior. We propose state-aware anomaly detection that uses state dependent detection thresholds, which provide ...
An edge computing based anomaly detection method in IoT industrial sustainability
AbstractIn recent years, the evolving Internet of Things (IoT) technology has been widely used in various industrial scenarios, whereby massive sensor data involving both normal data and anomalous data are generated. However, the anomalies ...
Highlights- The anomalies involved in sensor data from time series might have a great impact on the industrial sustainability.
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Monica Tentori,
- Nadir Weibel,
- Kristof Van Laerhoven,
- Program Chairs:
- Gregory Abowd,
- Flora Salim
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 188Total Downloads
- Downloads (Last 12 months)18
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in