Subject. The paper reviews the problem of anomaly detection in home automation systems. Authors define specificities of the existing security networks and accentuate the need of the detection of informational and physical impact on sensors. Characteristics of the transmitted information and physical impacts on automation devices are analysed and used as metrics for the anomalous behavior detection. Various machine learning algorithms for anomaly detection are compared and reviewed. Methods. The paper reviews the anomaly detection method that includes artificial neural networks as a detection tool. In this method characteristics of the security network devices are analysed to detect an anomalous behaviour, and exactly this type of data shoul...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
The Smart Home (SH) has become an appealing target of cyberattacks. Due to the limitation of hardwar...
IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical I...
In this paper, we present a model to monitor the smart grid for any anomalous/malicious activity or ...
Smart building equipment and automation systems often become a target of attacks and are used for at...
In this paper, a security solution is proposed for IoT smart homes based on constructing behavioral ...
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly detection ...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
The emplacement of wireless sensor networks (WSNs) has increased dramatically in the last few years....
The growing use of the Internet of Things (IoT) in different areas implies a proportional growth in ...
Anomaly detection is concerned with identifying data patterns that deviate remarkably from the expec...
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collectio...
With the increasing number of computers being connected to the Internet, security of an information ...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
The article deals with detection of network anomalies. Network anomalies include everything that is ...
The Smart Home (SH) has become an appealing target of cyberattacks. Due to the limitation of hardwar...
IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical I...
In this paper, we present a model to monitor the smart grid for any anomalous/malicious activity or ...
Smart building equipment and automation systems often become a target of attacks and are used for at...
In this paper, a security solution is proposed for IoT smart homes based on constructing behavioral ...
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly detection ...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
The emplacement of wireless sensor networks (WSNs) has increased dramatically in the last few years....
The growing use of the Internet of Things (IoT) in different areas implies a proportional growth in ...
Anomaly detection is concerned with identifying data patterns that deviate remarkably from the expec...
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collectio...
With the increasing number of computers being connected to the Internet, security of an information ...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Anomalies could be the threats to the network that have ever/never happened. To protect networks aga...
The article deals with detection of network anomalies. Network anomalies include everything that is ...