Results for ' Anomaly Detection'

792 found
Order:
  1. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  2. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  23
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Classification of Anomalies in Gastrointestinal Tract Using Deep Learning.Ibtesam M. Dheir & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):15-28.
    Automatic detection of diseases and anatomical landmarks in medical images by the use of computers is important and considered a challenging process that could help medical diagnosis and reduce the cost and time of investigational procedures and refine health care systems all over the world. Recently, gastrointestinal (GI) tract disease diagnosis through endoscopic image classification is an active research area in the biomedical field. Several GI tract disease classification methods based on image processing and machine learning techniques have been (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  5. Reinterpreting Relativity: Using the Equivalence Principle to Explain Away Cosmological Anomalies.Marcus Arvan - manuscript
    According to the standard interpretation of Einstein’s field equations, gravity consists of mass-energy curving spacetime, and an additional physical force or entity—denoted by Λ (the ‘cosmological constant’)—is responsible for the Universe’s metric-expansion. Although General Relativity’s direct predictions have been systematically confirmed, the dominant cosmological model thought to follow from it—the ΛCDM (Lambda cold dark matter) model of the Universe’s history and composition—faces considerable challenges, including various observational anomalies and experimental failures to detect dark matter, dark energy, or inflation-field candidates. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  85
    SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  9. Feyerabend’s rule and dark matter.David Merritt - 2021 - Synthese 199 (3-4):8921-8942.
    Paul Feyerabend argued that theories can be faced with experimental anomalies whose refuting character can only be recognized by developing alternatives to the theory. The alternate theory must explain the experimental results without contrivance and it must also be supported by independent evidence. I show that the situation described by Feyerabend arises again and again in experiments or observations that test the postulates in the standard cosmological model relating to dark matter. The alternate theory is Milgrom’s modified dynamics. I discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Formal thought disorder and logical form: A symbolic computational model of terminological knowledge.Luis M. Augusto & Farshad Badie - 2022 - Journal of Knowledge Structures and Systems 3 (4):1-37.
    Although formal thought disorder (FTD) has been for long a clinical label in the assessment of some psychiatric disorders, in particular of schizophrenia, it remains a source of controversy, mostly because it is hard to say what exactly the “formal” in FTD refers to. We see anomalous processing of terminological knowledge, a core construct of human knowledge in general, behind FTD symptoms and we approach this anomaly from a strictly formal perspective. More specifically, we present here a symbolic computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Do attitudes about and behaviors towards people who enhance their cognition depend on their looks?Charles Siegel, Clifford Ian Workman, Stacey Humphries & Anjan Chatterjee - forthcoming - PsyArXiv Preprint:1-29.
    Public attitudes towards cognitive enhancement––e.g., using stimulants like Adderall and Ritalin to improve mental functioning––are mixed. Attitudes vary by context and prompt ethical concerns about fairness, obligation, and authenticity/character. While people may have strong views about the morality of cognitive enhancement, how these views are affected by the physical characteristics of enhancers is unknown. Visible facial anomalies (e.g., scars) bear negatively on perceptions of moral character. This pre-registered study (osf[dot]io/uaw6c/) tested the hypothesis that such negative biases against people with facial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Combating Resistance: The Case for a Global Antibiotics Treaty.Jonny Anomaly - 2010 - Public Health Ethics 3 (1):13-22.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  13. What's Wrong with Factory Farming?Jonny Anomaly - 2015 - Public Health Ethics 8 (3):246-254.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  14. Defending Eugenics: From cryptic choice to conscious selection.Jonny Anomaly - 2018 - Monash Bioethics Review 35:24-35.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  15. Public Goods and Government Action.Jonny Anomaly - 2015 - Politics, Philosophy and Economics 14 (2):109-128.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  16. Enlightened Tribalism.Jonathan Anomaly, Filipe Faria & Craig Willy - forthcoming - Journal of Controversial Ideas.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Great Minds Think Different: Preserving Cognitive Diversity in an Age of Gene Editing.Jonny Anomaly, Julian Savulescu & Christopher Gyngell - 2020 - Bioethics 34 (1):81-89.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  18. Flesh Without Blood: The public health argument for synthetic meat.Jonathan Anomaly, Diana Fleischman, Heather Browning & Walter Veit - 2023 - Journal of Bioethical Inquiry 20 (3).
    Download  
     
    Export citation  
     
    Bookmark  
  19. Race Research and the Ethics of Belief.Jonny Anomaly - 2017 - Journal of Bioethical Inquiry 14 (2):287-297.
    On most accounts, beliefs are supposed to fit the world rather than change it. But believing can have social consequences, since the beliefs we form underwrite our actions and impact our character. Because our beliefs affect how we live our lives and how we treat other people, it is surprising how little attention is usually given to the moral status of believing apart from its epistemic justification. In what follows, I develop a version of the harm principle that applies to (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  20. Compensation for Cures: Paying People to Participate in Challenge Studies.Jonathan Anomaly & Julian Savulescu - 2019 - Bioethics 33 (7):792-797.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  21. Trust, Trade, and Moral Progress.Jonny Anomaly - 2017 - Social Philosophy and Policy 34 (2):89-107.
    Abstract:Trust is important for a variety of social relationships. Trust facilitates trade, which increases prosperity and induces us to interact with people of different backgrounds on terms that benefit all parties. Trade promotes trustworthiness, which enables us to form meaningful as well as mutually beneficial relationships. In what follows, I argue that when we erect institutions that enhance trust and reward people who are worthy of trust, we create the conditions for a certain kind of moral progress.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Ethics, Antibiotics, and Public Policy.Jonny Anomaly - 2017 - Georgetown Journal of Law and Public Policy 15 (2).
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  23. Public Goods and Education.Jonny Anomaly - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Race, Eugenics, and the Holocaust.Jonathan Anomaly - 2022 - In Ira Bedzow & Stacy Gallin (eds.), Bioethics and the Holocaust. Springer. pp. 153-170.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Public Health and Public Goods.Jonny Anomaly - 2011 - Public Health Ethics 4 (3):251-259.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  26. Antibiotics and Animal Agriculture: The need for global collective action.Jonny Anomaly - 2018 - In Michael Selgelid (ed.), Ethics and Antimicrobial Resistance. Oxford University Press. pp. 297-308.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  27. Internal reasons and the ought-implies-can principle.Jonny Anomaly - 2008 - Philosophical Forum 39 (4):469-483.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  28. Creating Future People: The Science and Ethics of Genetic Enhancement (2nd edition).Jonathan Anomaly - 2024 - London, UK: Routledge.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  29. Public Goods and Procreation.Jonny Anomaly - 2014 - Monash Bioethics Review 32 (3-4):172-188.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Social Norms, The Invisible Hand, and the Law.Jonny Anomaly & Geoffrey Brennan - 2014 - University of Queensland Law Journal 33 (2).
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  31. Is Obesity a Public Health Problem?Jonny Anomaly - 2012 - Public Health Ethics 5 (3):216-221.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  32. Can Liberalism Last? Demographic Demise and the Future of Liberalism.Jonathan Anomaly & Filipe Nobre Faria - 2023 - Social Philosophy and Policy 40 (2):524-543.
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Egalitarian Fallacy: Are Group Differences Compatible with Political Liberalism?Jonathan Anomaly & Bo Winegard - 2020 - Philosophia 48 (2):433-444.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. Collective Action and Individual Choice.Jonny Anomaly - 2013 - Journal of Medical Ethics 39 (4):752-756.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  35. Harm to Others: The social cost of antibiotics in agriculture.Jonny Anomaly - 2009 - Journal of Agricultural and Environmental Ethics 22 (5):423-435.
    See "What's Wrong with Factory Farming?" (2015) for an updated treatment of these issues.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  36. Dodging Darwin: Race, Evolution, and the Hereditarian Hypothesis.Jonny Anomaly - 2020 - Personality and Individual Differences 160.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Nietzsche's critique of utilitarianism.Jonny Anomaly - 2005 - Journal of Nietzsche Studies 29 (29):1-15.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Personal Identity and Practical Reason: The Failure of Kantian Replies to Parfit.Jonny Anomaly - 2008 - Dialogue 47 (2):331-350.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. The Ethics of Genetic Enhancement: Key Concepts and Future Prospects.Jonathan Anomaly & Tess Johnson - 2016 - In Steve Clarke, Julian Savulescu, C. A. J. Coady, Alberto Giubilini & Sagar Sanyal (eds.), The Ethics of Human Enhancement: Understanding the Debate. Oxford, United Kingdom: Oxford University Press. pp. 143-151.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Cognitive Enhancement and Network Effects: How Individual Prosperity Depends on Group Traits.Jonathan Anomaly & Garett Jones - 2020 - Philosophia 48:1753-1768.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. What is Public Health?Jonathan Anomaly - 2021 - Public Choice 188.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Intensive Animal Agriculture and Human Health.Jonathan Anomaly - 2019 - In Bob Fischer (ed.), Routledge Handbook of Animal Ethics. New York: Routledge.
    Download  
     
    Export citation  
     
    Bookmark  
  43. What is an Epidemic?: Currents in Contemporary Bioethics.Jonny Anomaly - 2014 - Journal of Law, Medicine and Ethics 42 (3):389-391.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Markets and Economic Theory.Jonny Anomaly & Geoffrey Brennan - 2013 - In Byron Kaldis (ed.), Encyclopedia of Philosophy and the Social Sciences. Los Angeles: Sage Publications.
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Future of Phage: Ethical challenges of using phage viruses to treat bacterial infections.Jonathan Anomaly - 2020 - Public Health Ethics 13.
    Download  
     
    Export citation  
     
    Bookmark  
  46. Review of Brad Spellberg, Rising Plague: The Global Threat from Deadly Bacteria and Our Dwindling Arsenal to Fight Them. [REVIEW]Jonny Anomaly - 2010 - American Journal of Bioethics 10 (11):39-41.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Review of Michael Hauskeller, Better Humans? Understanding the Enhancement Project. [REVIEW]Jonny Anomaly - 2013 - Notre Dame Philosophical Reviews.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Can ‘eugenics’ be defended?Walter Veit, J. Anomaly, N. Agar, P. Singer, D. Fleischman & F. Minerva - 2021 - Bioethics Review 39 (1):60–67.
    In recent years, bioethical discourse around the topic of ‘genetic enhancement’ has become increasingly politicized. We fear there is too much focus on the semantic question of whether we should call particular practices and emerging bio-technologies such as CRISPR ‘eugenics’, rather than the more important question of how we should view them from the perspective of ethics and policy. Here, we address the question of whether ‘eugenics’ can be defended and how proponents and critics of enhancement should engage with each (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Race, Genes, and the Ethics of Belief: A review of Nicholas Wade, A Troublesome Inheritance. [REVIEW]Jonny Anomaly - 2014 - Hastings Center Report 44 (5):51-52.
    A Troublesome Inheritance, by Nicholas Wade, should be read by anyone interested in race and recent human evolution. Wade deserves credit for challenging the popular dog­ma that biological differences between groups either don't exist or cannot ex­plain the relative success of different groups at different tasks. Wade's work should be read alongside another re­cent book, The 10,000 Year Explosion: How Civilization Accelerated Human Evolution, by Gregory Cochran and Henry Harpending. Together, these books represent a ma­jor turning point in the public (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Review of Derek Parfit, On What Matters. [REVIEW]Jonathan Anomaly - 2013 - Journal of Moral Philosophy 10 (3):358-360.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 792