Embedded system such as microcontrollers has become more powerful and cheaper during the past couple of years. This has led to more and more development of on-edge applications, one of which is anomaly detection using machine learning. This thesis investigates the ability to implement, deploy and run the unsupervised anomaly detection algorithm called Isolation Forest, and its modified version Mondrian Isolation Forest on a microcontroller. Both algorithms were successfully implemented and deployed. The regular Isolation Forest algorithm resulted in being able to function as an anomaly detection algorithm by using both data sets and streaming data. However, the Mondrian Isolation Forest was too resource hungry to be able to function as a pr...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
The detection of false data-injection attacks in industrial networks is a growing challenge in the i...
The detection of false data-injection attacks in industrial networks is a growing challenge in the i...
Embedded system such as microcontrollers has become more powerful and cheaper during the past couple...
Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these...
Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these...
This thesis investigates anomaly detection and classification in a simulated modular manufacturingen...
Unsupervised anomaly detection tackles the problem of finding anomalies inside datasets without the ...
Unsupervised anomaly detection tackles the problem of finding anomalies inside datasets without the ...
Anomaly detection methods are devoted to target detection schemes in which no priori information ab...
The occurrence of anomalies and unexpected, process-related faults is a major problem for manufactur...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
The only way for the world to move into the bright future is to move from nonrenewable resources in...
Machine Learning-based Anomaly Detection approaches are efficient tools to monitor complex processes...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
The detection of false data-injection attacks in industrial networks is a growing challenge in the i...
The detection of false data-injection attacks in industrial networks is a growing challenge in the i...
Embedded system such as microcontrollers has become more powerful and cheaper during the past couple...
Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these...
Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these...
This thesis investigates anomaly detection and classification in a simulated modular manufacturingen...
Unsupervised anomaly detection tackles the problem of finding anomalies inside datasets without the ...
Unsupervised anomaly detection tackles the problem of finding anomalies inside datasets without the ...
Anomaly detection methods are devoted to target detection schemes in which no priori information ab...
The occurrence of anomalies and unexpected, process-related faults is a major problem for manufactur...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for exam...
The only way for the world to move into the bright future is to move from nonrenewable resources in...
Machine Learning-based Anomaly Detection approaches are efficient tools to monitor complex processes...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
The detection of false data-injection attacks in industrial networks is a growing challenge in the i...
The detection of false data-injection attacks in industrial networks is a growing challenge in the i...