期刊文献+
共找到583篇文章
< 1 2 30 >
每页显示 20 50 100
Personality Trait Detection via Transfer Learning
1
作者 Bashar Alshouha Jesus Serrano-Guerrero +2 位作者 Francisco Chiclana Francisco P.Romero Jose A.Olivas 《Computers, Materials & Continua》 SCIE EI 2024年第2期1933-1956,共24页
Personality recognition plays a pivotal role when developing user-centric solutions such as recommender systems or decision support systems across various domains,including education,e-commerce,or human resources.Tra-... Personality recognition plays a pivotal role when developing user-centric solutions such as recommender systems or decision support systems across various domains,including education,e-commerce,or human resources.Tra-ditional machine learning techniques have been broadly employed for personality trait identification;nevertheless,the development of new technologies based on deep learning has led to new opportunities to improve their performance.This study focuses on the capabilities of pre-trained language models such as BERT,RoBERTa,ALBERT,ELECTRA,ERNIE,or XLNet,to deal with the task of personality recognition.These models are able to capture structural features from textual content and comprehend a multitude of language facets and complex features such as hierarchical relationships or long-term dependencies.This makes them suitable to classify multi-label personality traits from reviews while mitigating computational costs.The focus of this approach centers on developing an architecture based on different layers able to capture the semantic context and structural features from texts.Moreover,it is able to fine-tune the previous models using the MyPersonality dataset,which comprises 9,917 status updates contributed by 250 Facebook users.These status updates are categorized according to the well-known Big Five personality model,setting the stage for a comprehensive exploration of personality traits.To test the proposal,a set of experiments have been performed using different metrics such as the exact match ratio,hamming loss,zero-one-loss,precision,recall,F1-score,and weighted averages.The results reveal ERNIE is the top-performing model,achieving an exact match ratio of 72.32%,an accuracy rate of 87.17%,and 84.41%of F1-score.The findings demonstrate that the tested models substantially outperform other state-of-the-art studies,enhancing the accuracy by at least 3%and confirming them as powerful tools for personality recognition.These findings represent substantial advancements in personality recognition,making them appropriate for the development of user-centric applications. 展开更多
关键词 Personality trait detection pre-trained language model big five model transfer learning
下载PDF
Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model
2
作者 R.Sheeba R.Sharmila +1 位作者 Ahmed Alkhayyat Rami Q.Malik 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1415-1429,共15页
Lately,the Internet of Things(IoT)application requires millions of structured and unstructured data since it has numerous problems,such as data organization,production,and capturing.To address these shortcomings,big d... Lately,the Internet of Things(IoT)application requires millions of structured and unstructured data since it has numerous problems,such as data organization,production,and capturing.To address these shortcomings,big data analytics is the most superior technology that has to be adapted.Even though big data and IoT could make human life more convenient,those benefits come at the expense of security.To manage these kinds of threats,the intrusion detection system has been extensively applied to identify malicious network traffic,particularly once the preventive technique fails at the level of endpoint IoT devices.As cyberattacks targeting IoT have gradually become stealthy and more sophisticated,intrusion detection systems(IDS)must continually emerge to manage evolving security threats.This study devises Big Data Analytics with the Internet of Things Assisted Intrusion Detection using Modified Buffalo Optimization Algorithm with Deep Learning(IDMBOA-DL)algorithm.In the presented IDMBOA-DL model,the Hadoop MapReduce tool is exploited for managing big data.The MBOA algorithm is applied to derive an optimal subset of features from picking an optimum set of feature subsets.Finally,the sine cosine algorithm(SCA)with convolutional autoencoder(CAE)mechanism is utilized to recognize and classify the intrusions in the IoT network.A wide range of simulations was conducted to demonstrate the enhanced results of the IDMBOA-DL algorithm.The comparison outcomes emphasized the better performance of the IDMBOA-DL model over other approaches. 展开更多
关键词 big data analytics internet of things SECURITY intrusion detection deep learning
下载PDF
A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain 被引量:5
3
作者 Hangjun Zhou Guang Sun +4 位作者 Sha Fu Xiaoping Fan Wangdong Jiang Shuting Hu Lingjiao Li 《Computers, Materials & Continua》 SCIE EI 2020年第8期1091-1105,共15页
Supply Chain Finance(SCF)is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain.In recent years,with the deep integration of supply c... Supply Chain Finance(SCF)is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain.In recent years,with the deep integration of supply chain and Internet,Big Data,Artificial Intelligence,Internet of Things,Blockchain,etc.,the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes.However,with the rapid development of new technologies,the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal ones.The lack of enough capability to handle the big data volumes and mitigate the financial frauds may lead to huge losses in supply chains.In this article,a distributed approach of big data mining is proposed for financial fraud detection in a supply chain,which implements the distributed deep learning model of Convolutional Neural Network(CNN)on big data infrastructure of Apache Spark and Hadoop to speed up the processing of the large dataset in parallel and reduce the processing time significantly.By training and testing on the continually updated SCF dataset,the approach can intelligently and automatically classify the massive data samples and discover the fraudulent financing behaviors,so as to enhance the financial fraud detection with high precision and recall rates,and reduce the losses of frauds in a supply chain. 展开更多
关键词 big data mining deep learning fraud detection supply chain Internet of Things
下载PDF
A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data 被引量:4
4
作者 Xiaonian Wu Chuyun Zhang +2 位作者 Runlian Zhang Yujue Wang Jinhua Cui 《Computers, Materials & Continua》 SCIE EI 2018年第7期61-72,共12页
There are two key issues in distributed intrusion detection system,that is,maintaining load balance of system and protecting data integrity.To address these issues,this paper proposes a new distributed intrusion detec... There are two key issues in distributed intrusion detection system,that is,maintaining load balance of system and protecting data integrity.To address these issues,this paper proposes a new distributed intrusion detection model for big data based on nondestructive partitioning and balanced allocation.A data allocation strategy based on capacity and workload is introduced to achieve local load balance,and a dynamic load adjustment strategy is adopted to maintain global load balance of cluster.Moreover,data integrity is protected by using session reassemble and session partitioning.The simulation results show that the new model enjoys favorable advantages such as good load balance,higher detection rate and detection efficiency. 展开更多
关键词 Distributed intrusion detection data allocation load balancing data integrity big data
下载PDF
Random Forests Algorithm Based Duplicate Detection in On-Site Programming Big Data Environment 被引量:1
5
作者 Qianqian Li Meng Li +1 位作者 Lei Guo Zhen Zhang 《Journal of Information Hiding and Privacy Protection》 2020年第4期199-205,共7页
On-site programming big data refers to the massive data generated in the process of software development with the characteristics of real-time,complexity and high-difficulty for processing.Therefore,data cleaning is e... On-site programming big data refers to the massive data generated in the process of software development with the characteristics of real-time,complexity and high-difficulty for processing.Therefore,data cleaning is essential for on-site programming big data.Duplicate data detection is an important step in data cleaning,which can save storage resources and enhance data consistency.Due to the insufficiency in traditional Sorted Neighborhood Method(SNM)and the difficulty of high-dimensional data detection,an optimized algorithm based on random forests with the dynamic and adaptive window size is proposed.The efficiency of the algorithm can be elevated by improving the method of the key-selection,reducing dimension of data set and using an adaptive variable size sliding window.Experimental results show that the improved SNM algorithm exhibits better performance and achieve higher accuracy. 展开更多
关键词 On-site programming big data duplicate record detection random forests adaptive sliding window
下载PDF
Research on the Anomaly Detection Method in Intelligent Patrol Based on Big Data Analysis
6
作者 Xiaoqing Deng 《Journal of Computer and Communications》 2019年第8期1-7,共7页
The network anomaly detection in intelligent patrol is based on the trigger of a single threshold of network element performance parameters in patrol task, which has a high false alarm rate and low efficiency. In orde... The network anomaly detection in intelligent patrol is based on the trigger of a single threshold of network element performance parameters in patrol task, which has a high false alarm rate and low efficiency. In order to effectively and accurately integrate network performance, this paper proposes to mine network element performance data and network element log information in the integrated automatic patrol to detect network anomalies. Because log files have a large amount of data and a variety of types, and log data has a complex structure and contains large implied information. The relationship between network anomalies and time can actively discover through the analysis of the log files. Therefore, big data mining and classification can greatly improve the efficiency of data processing. However, the accuracy of finding network anomalies is insufficient only for log analysis. Therefore, this paper puts forward the performance indexes collected in the log analysis and patrol inspection system and adopts the sequence analysis algorithm to detect network anomalies, so as to improve the accuracy and efficiency of detection. 展开更多
关键词 big DATA INTELLIGENT PATROL ANOMALY detection
下载PDF
Infrared Thermography and Big Data for Detection of People with Fever and Determination of High-Risk Areas in Epidemic Situations
7
作者 ROBALINO ESPINOZA Viviana Lorena TAMAYO FREIRE Alexis Shipson 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第S01期122-128,共7页
Technological advances in computer science and their application in our daily life allow us to improve our understanding of problems and solve them effectively.A system design to detect people with fever and determine... Technological advances in computer science and their application in our daily life allow us to improve our understanding of problems and solve them effectively.A system design to detect people with fever and determine highrisk areas using infrared thermography and big data is presented.In order to detect people with fever,face detection algorithms of Viola-Jones and Kanade-Lucas are investigated,and comparison between them is presented using a training set of 406 thermal images and a test set of 2072 thermal images.Thermography analysis is performed on detected faces to obtain the temperature level on Celsius scale.With this information a sample database is created.To perform big data experimental analysis,Power Bi tool is used to determine the high-risk area.The experimental results show that Viola-Jones algorithm has a higher performance recognizing faces of thermal images than KanadeLucas,having a high detection rate,less false-positives rate and false-negatives rate. 展开更多
关键词 face detection THERMOGRAPHY image analysis big data
下载PDF
Intrusion Detection System for Big Data Analytics in IoT Environment
8
作者 M.Anuradha G.Mani +3 位作者 T.Shanthi N.R.Nagarajan P.Suresh C.Bharatiraja 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期381-396,共16页
In the digital area,Internet of Things(IoT)and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal traffic.Though IoT network... In the digital area,Internet of Things(IoT)and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal traffic.Though IoT networks are popular and widely employed in real world applications,security in IoT networks remains a challenging problem.Conventional intrusion detection systems(IDS)cannot be employed in IoT networks owing to the limitations in resources and complexity.Therefore,this paper concentrates on the design of intelligent metaheuristic optimization based feature selection with deep learning(IMFSDL)based classification model,called IMFSDL-IDS for IoT networks.The proposed IMFSDL-IDS model involves data collection as the primary process utilizing the IoT devices and is preprocessed in two stages:data transformation and data normalization.To manage big data,Hadoop ecosystem is employed.Besides,the IMFSDL-IDS model includes a hill climbing with moth flame optimization(HCMFO)for feature subset selection to reduce the complexity and increase the overall detection efficiency.Moreover,the beetle antenna search(BAS)with variational autoencoder(VAE),called BAS-VAE technique is applied for the detection of intrusions in the feature reduced data.The BAS algorithm is integrated into the VAE to properly tune the parameters involved in it and thereby raises the classification performance.To validate the intrusion detection performance of the IMFSDL-IDS system,a set of experimentations were carried out on the standard IDS dataset and the results are investigated under distinct aspects.The resultant experimental values pointed out the betterment of the IMFSDL-IDS model over the compared models with the maximum accuracy 95.25%and 97.39%on the applied NSL-KDD and UNSW-NB15 dataset correspondingly. 展开更多
关键词 big data CYBERSECURITY IoT networks intrusion detection deep learning metaheuristics intelligent systems
下载PDF
A Cooperative Abnormal Behavior Detection Framework Based on Big Data Analytics
9
作者 Naila Marir Huiqiang Wang 《国际计算机前沿大会会议论文集》 2017年第1期48-50,共3页
As cyber attacks increase in volume and complexity,it becomes more and more difficult for existing analytical tools to detect previously unseen malware.This paper proposes a cooperative framework to leverage the robus... As cyber attacks increase in volume and complexity,it becomes more and more difficult for existing analytical tools to detect previously unseen malware.This paper proposes a cooperative framework to leverage the robustness of big data analytics and the power of ensemble learning techniques to detect the abnormal behavior.In addition to this proposal,we implement a large scale network abnormal traffic behavior detection system performed by the framework.The proposed model detects the abnormal behavior from large scale network traffic data using a combination of a balanced decomposition algorithm and an ensemble SVM.First,the collected dataset is divided into k subsets based on the similarity between patterns using a parallel map reduce k-means algorithm.Then,patterns are randomly selected from each cluster and balanced training sub datasets are formed.Next,the subsets are fed into the mappers to build an SVM model.The construction of the ensemble is achieved in the reduce phase.The proposed structure closely delivers a high accuracy as the number of iterations increases.Experimental results show a promising gain in detection rate and false alarm compared with other existing models. 展开更多
关键词 Support vector machines ABNORMAL behavior detection big data CYBER ATTACKS ENSEMBLE CLASSIFIER MapReduce
下载PDF
Semi-supervised multi-layered clustering model for intrusion detection 被引量:9
10
作者 Omar Y.Al-Jarrah Yousof A1-Hammdi +2 位作者 Patti D.Yoo Sami Muhaidat Mahmoud Al-Qutayri 《Digital Communications and Networks》 SCIE 2018年第4期277-286,共10页
A Machine Learning (ML)-based Intrusion Detection and Prevention System (IDPS)requires a large amount of labeled up-to-date training data to effectively detect intrusions and generalize well to novel attacks.However,t... A Machine Learning (ML)-based Intrusion Detection and Prevention System (IDPS)requires a large amount of labeled up-to-date training data to effectively detect intrusions and generalize well to novel attacks.However,the labeling of data is costly and becomes infeasible when dealing with big data,such as those generated by Intemet of Things applications.To this effect,building an ML model that learns from non-labeled or partially labeled data is of critical importance.This paper proposes a Semi-supervised Mniti-Layered Clustering ((SMLC))model for the detection and prevention of network intrusion.SMLC has the capability to learn from partially labeled data while achieving a detection performance comparable to that of supervised ML-based IDPS.The performance of SMLC is compared with that of a well-known semi-supervised model (tri-training)and of supervised ensemble ML models, namely Random.Forest,Bagging,and AdaboostM1on two benchmark network-intrusion datasets,NSL and Kyoto 2006+.Experimental resnits show that SMLC is superior to tri-training,providing a comparable detection accuracy with 20%less labeled instances of training data.Furthermore,our results demonstrate that our scheme has a detection accuracy comparable to that of the supervised ensemble models. 展开更多
关键词 SEMI-SUPERVISED INTRUSION detection MACHINE learning Classification ENSEMBLES big data
下载PDF
Deep Learning-Based Hybrid Intelligent Intrusion Detection System 被引量:5
11
作者 Muhammad Ashfaq Khan Yangwoo Kim 《Computers, Materials & Continua》 SCIE EI 2021年第7期671-687,共17页
Machine learning(ML)algorithms are often used to design effective intrusion detection(ID)systems for appropriate mitigation and effective detection of malicious cyber threats at the host and network levels.However,cyb... Machine learning(ML)algorithms are often used to design effective intrusion detection(ID)systems for appropriate mitigation and effective detection of malicious cyber threats at the host and network levels.However,cybersecurity attacks are still increasing.An ID system can play a vital role in detecting such threats.Existing ID systems are unable to detect malicious threats,primarily because they adopt approaches that are based on traditional ML techniques,which are less concerned with the accurate classication and feature selection.Thus,developing an accurate and intelligent ID system is a priority.The main objective of this study was to develop a hybrid intelligent intrusion detection system(HIIDS)to learn crucial features representation efciently and automatically from massive unlabeled raw network trafc data.Many ID datasets are publicly available to the cybersecurity research community.As such,we used a spark MLlib(machine learning library)-based robust classier,such as logistic regression(LR),extreme gradient boosting(XGB)was used for anomaly detection,and a state-of-the-art DL,such as a long short-term memory autoencoder(LSTMAE)for misuse attack was used to develop an efcient and HIIDS to detect and classify unpredictable attacks.Our approach utilized LSTM to detect temporal features and an AE to more efciently detect global features.Therefore,to evaluate the efcacy of our proposed approach,experiments were conducted on a publicly existing dataset,the contemporary real-life ISCX-UNB dataset.The simulation results demonstrate that our proposed spark MLlib and LSTMAE-based HIIDS signicantly outperformed existing ID approaches,achieving a high accuracy rate of up to 97.52%for the ISCX-UNB dataset respectively 10-fold crossvalidation test.It is quite promising to use our proposed HIIDS in real-world circumstances on a large-scale. 展开更多
关键词 Machine learning intrusion detection system deep learning spark MLlib LSTM big data
下载PDF
Deep Learning Based Optimal Multimodal Fusion Framework for Intrusion Detection Systems for Healthcare Data 被引量:1
12
作者 Phong Thanh Nguyen Vy Dang Bich Huynh +3 位作者 Khoa Dang Vo Phuong Thanh Phan Mohamed Elhoseny Dac-Nhuong Le 《Computers, Materials & Continua》 SCIE EI 2021年第3期2555-2571,共17页
Data fusion is a multidisciplinary research area that involves different domains.It is used to attain minimum detection error probability and maximum reliability with the help of data retrieved from multiple healthcar... Data fusion is a multidisciplinary research area that involves different domains.It is used to attain minimum detection error probability and maximum reliability with the help of data retrieved from multiple healthcare sources.The generation of huge quantity of data from medical devices resulted in the formation of big data during which data fusion techniques become essential.Securing medical data is a crucial issue of exponentially-pacing computing world and can be achieved by Intrusion Detection Systems(IDS).In this regard,since singularmodality is not adequate to attain high detection rate,there is a need exists to merge diverse techniques using decision-based multimodal fusion process.In this view,this research article presents a new multimodal fusion-based IDS to secure the healthcare data using Spark.The proposed model involves decision-based fusion model which has different processes such as initialization,pre-processing,Feature Selection(FS)and multimodal classification for effective detection of intrusions.In FS process,a chaotic Butterfly Optimization(BO)algorithmcalled CBOA is introduced.Though the classic BO algorithm offers effective exploration,it fails in achieving faster convergence.In order to overcome this,i.e.,to improve the convergence rate,this research work modifies the required parameters of BO algorithm using chaos theory.Finally,to detect intrusions,multimodal classifier is applied by incorporating three Deep Learning(DL)-based classification models.Besides,the concepts like Hadoop MapReduce and Spark were also utilized in this study to achieve faster computation of big data in parallel computation platform.To validate the outcome of the presented model,a series of experimentations was performed using the benchmark NSLKDDCup99 Dataset repository.The proposed model demonstrated its effective results on the applied dataset by offering the maximum accuracy of 99.21%,precision of 98.93%and detection rate of 99.59%.The results assured the betterment of the proposed model. 展开更多
关键词 big data data fusion deep learning intrusion detection bio-inspired algorithm SPARK
下载PDF
SQoE KQIs Anomaly Detection in Cellular Networks: Fast Online Detection Framework with Hourglass Clustering
13
作者 Xiaowei Qin Shuang Tang +2 位作者 Xiaohui Chen DANDan Miao Guo Wei 《China Communications》 SCIE CSCD 2018年第10期25-37,共13页
The explosive growth of data volume in mobile networks makes fast online diagnose a pressing search problem. In this paper, an object-oriented detection framework with a two-step clustering, named as Hourglass Cluster... The explosive growth of data volume in mobile networks makes fast online diagnose a pressing search problem. In this paper, an object-oriented detection framework with a two-step clustering, named as Hourglass Clustering, is given. Where three object parameters are chosen as Synthetical Quality of Experience(SQo E) Key Quality Indicators(KQIs) to reflect accessibility, integrality, and maintainability of networks. Then, we choose represented Key Performance Indicators(r KPIs) as cause parameters with correlation analysis. For these two kinds of parameters, a hybrid algorithm combining the self-organizing map(SOM) and 展开更多
关键词 big data SQoE anomaly detection hourglass clustering codebook.
下载PDF
Loss-of-Main Monitoring and Detection for Distributed Generations Using Dynamic Principal Component Analysis
14
作者 Yuanjun Guo Kang Li D. M. Laverty 《Journal of Power and Energy Engineering》 2014年第4期423-431,共9页
In this paper, our previous work on Principal Component Analysis (PCA) based fault detection method is extended to the dynamic monitoring and detection of loss-of-main in power systems using wide-area synchrophasor me... In this paper, our previous work on Principal Component Analysis (PCA) based fault detection method is extended to the dynamic monitoring and detection of loss-of-main in power systems using wide-area synchrophasor measurements. In the previous work, a static PCA model was built and verified to be capable of detecting and extracting system faulty events;however the false alarm rate is high. To address this problem, this paper uses a well-known ‘time lag shift’ method to include dynamic behavior of the PCA model based on the synchronized measurements from Phasor Measurement Units (PMU), which is named as the Dynamic Principal Component Analysis (DPCA). Compared with the static PCA approach as well as the traditional passive mechanisms of loss-of-main detection, the proposed DPCA procedure describes how the synchrophasors are linearly auto- and cross-correlated, based on conducting the singular value decomposition on the augmented time lagged synchrophasor matrix. Similar to the static PCA method, two statistics, namely T2 and Q with confidence limits are calculated to form intuitive charts for engineers or operators to monitor the loss-of-main situation in real time. The effectiveness of the proposed methodology is evaluated on the loss-of-main monitoring of a real system, where the historic data are recorded from PMUs installed in several locations in the UK/Ireland power system. 展开更多
关键词 Loss-of-Main detection PHASOR Measurement Units big Data Dynamic Principal Component Analysis
下载PDF
Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection
15
作者 R.Sakunthala Jenni S.Shankar 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期525-538,共14页
The detection of phishing and legitimate websites is considered a great challenge for web service providers because the users of such websites are indistinguishable.Phishing websites also create traffic in the entire ... The detection of phishing and legitimate websites is considered a great challenge for web service providers because the users of such websites are indistinguishable.Phishing websites also create traffic in the entire network.Another phishing issue is the broadening malware of the entire network,thus highlighting the demand for their detection while massive datasets(i.e.,big data)are processed.Despite the application of boosting mechanisms in phishing detection,these methods are prone to significant errors in their output,specifically due to the combination of all website features in the training state.The upcoming big data system requires MapReduce,a popular parallel programming,to process massive datasets.To address these issues,a probabilistic latent semantic and greedy levy gradient boosting(PLS-GLGB)algorithm for website phishing detection using MapReduce is proposed.A feature selection-based model is provided using a probabilistic intersective latent semantic preprocessing model to minimize errors in website phishing detection.Here,the missing data in each URL are identified and discarded for further processing to ensure data quality.Subsequently,with the preprocessed features(URLs),feature vectors are updated by the greedy levy divergence gradient(model)that selects the optimal features in the URL and accurately detects the websites.Thus,greedy levy efficiently differentiates between phishing websites and legitimate websites.Experiments are conducted using one of the largest public corpora of a website phish tank dataset.Results show that the PLS-GLGB algorithm for website phishing detection outperforms stateof-the-art phishing detection methods.Significant amounts of phishing detection time and errors are also saved during the detection of website phishing. 展开更多
关键词 Web service providers probabilistic intersective latent semantic greedy levy DIVERGENCE gradient phishing detection big data
下载PDF
Data Mining Based Cyber-Attack Detection
16
作者 TIANFIELD Huaglory 《系统仿真技术》 2017年第2期90-104,共15页
Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber secur... Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber security situational awareness. Then, the process of data mining based cyber-attack detection is discussed. Next,a multi-loop learning architecture is presented for data mining based cyber-attack detection. Finally,common data mining techniques for cyber-attack detection are discussed. 展开更多
关键词 big data analytics cyber-attack detection cyber security cyber situational awareness data mining pattern mining machine learning
下载PDF
The Research of Heartbeat Detection Technique for Blade Server
17
作者 Weiwei Jiang Naikuo Chen Shihua Geng 《国际计算机前沿大会会议论文集》 2015年第1期120-121,共2页
The blade servers have been widely used in the telecommunications,financial and other big data processing fields as for the high efficiency, stability and autonomy. This study takes the hot redundancy design for dual-... The blade servers have been widely used in the telecommunications,financial and other big data processing fields as for the high efficiency, stability and autonomy. This study takes the hot redundancy design for dual-BMC management of blade servers as the research project, and puts forward a heartbeat detection program utilizing I2C for transmission of IPMI commands. And it’s successfully applied to the blade servers to achieve a hot redundancy, monitor and management of master/slave BMC management module, which is more standardized, reliable, and easy to implement. 展开更多
关键词 BMC big data BLADE SERVER HEARTBEAT detection IPMI
下载PDF
应用SAP Enterprise Threat Detection实时发现针对网络安全的攻击 被引量:1
18
作者 Gerlinde Zibulski 王成 《信息技术与标准化》 2019年第1期62-63,共2页
作为智慧企业的安全解决方案,SAP Enterprise Threat Detection(企业威胁检测解决方案)是一种可以检测SAP系统是否受到恶意攻击的产品。它运行在SAP的旗舰产品SAP HANA内存数据库上,并利用了SAP HANA的分析功能以及机器学习/人工智能方... 作为智慧企业的安全解决方案,SAP Enterprise Threat Detection(企业威胁检测解决方案)是一种可以检测SAP系统是否受到恶意攻击的产品。它运行在SAP的旗舰产品SAP HANA内存数据库上,并利用了SAP HANA的分析功能以及机器学习/人工智能方面的新发明。 展开更多
关键词 网络安全 SAP ENTERPRISE THREAT detection SAP HANA 安全事件日志 大数据
下载PDF
Application Technologies and Challenges of Big Data Analytics in Anti-Money Laundering and Financial Fraud Detection
19
作者 Haoran Jiang 《Open Journal of Applied Sciences》 2024年第11期3226-3236,共11页
As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and cha... As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and challenges of big data analytics in anti-money laundering and financial fraud detection. The research begins by outlining the evolutionary trends of financial crimes and highlighting the new characteristics of the big data era. Subsequently, it systematically analyzes the application of big data analytics technologies in this field, including machine learning, network analysis, and real-time stream processing. Through case studies, the research demonstrates how these technologies enhance the accuracy and efficiency of anomalous transaction detection. However, the study also identifies challenges faced by big data analytics, such as data quality issues, algorithmic bias, and privacy protection concerns. To address these challenges, the research proposes solutions from both technological and managerial perspectives, including the application of privacy-preserving technologies like federated learning. Finally, the study discusses the development prospects of Regulatory Technology (RegTech), emphasizing the importance of synergy between technological innovation and regulatory policies. This research provides guidance for financial institutions and regulatory bodies in optimizing their anti-money laundering and fraud detection strategies. 展开更多
关键词 big Data Analytics Anti-Money Laundering Financial Fraud detection Machine Learning Regulatory Technology
下载PDF
Overlapping Community Detection Based on Community Connection Similarity of Maximum Clique
20
作者 Xiaodong Qian Lei Yang Jinhao Fang 《国际计算机前沿大会会议论文集》 2018年第1期18-18,共1页
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部