2022
DOI: 10.1007/978-981-16-8484-5_48
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Machine Learning in Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Every distinct class has a binary column that indicates whether it exists or not. To ensure accurate categorical information representation in a manner appropriate for machine learning models [12], this transformation is essential for algorithms that need numerical inputs. OneHotEncoder is especially helpful in classification situations when it's necessary to convert categorical labels into a format that predictive models can understand.…”
Section: Splitting Datamentioning
confidence: 99%
“…Every distinct class has a binary column that indicates whether it exists or not. To ensure accurate categorical information representation in a manner appropriate for machine learning models [12], this transformation is essential for algorithms that need numerical inputs. OneHotEncoder is especially helpful in classification situations when it's necessary to convert categorical labels into a format that predictive models can understand.…”
Section: Splitting Datamentioning
confidence: 99%
“…Moreira et al [3] proposed ISAD an intelligent system for network anomaly detection by combining fog computing and cloud computing approaches. The proposed model services machine learning methods to comprehend the normal performance of the system currents in the keen situation, provided that firm alteration to the common besides unexpected vagaries in system performance to evaluate the performance of the proposed technique it is tested by creating an artificial fog environment using Microsoft AZURE.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Keen Surroundings incline in the harvest extra system streams then old-fashioned complexes, payable to the mammoth ruler for shrewd campaigns in the system, as well as the various types of applications in these devices. Hence, the monitoring of these network currents produces a huge capacity of information, assembly the presentation for fogging and utility calculating indispensable to this situation [3].…”
Section: Introductionmentioning
confidence: 99%