A two-stage virtual machine abnormal behavior-based anomaly detection mechanism

被引:0
|
作者
Zhang, Hancui [1 ]
Zhou, Weida [1 ]
机构
[1] School of Information Science and Technology, Zhejiang Sci-Tech University, Hangzhou,310018, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
50
引用
收藏
页码:203 / 214
相关论文
共 50 条
  • [21] Two-Stage Deep Anomaly Detection With Heterogeneous Time Series Data
    Jeong, Kyeong-Joong
    Park, Jin-Duk
    Hwang, Kyusoon
    Kim, Seong-Lyun
    Shin, Won-Yong
    IEEE ACCESS, 2022, 10 : 13704 - 13714
  • [22] Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
    Yu, Xiao
    Tang, Lu An
    Han, Jiawei
    2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 617 - 626
  • [23] A Two-Stage Anomaly Detection Method Based on User Preference Features and the Deep Fusion Model
    Zhang, Sen-Lei
    Zhang, Bin
    Zhou, Yi-Tao
    Guo, Yue-Xuan
    Tan, Jing-Lei
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [24] Two-stage anomaly detection for positive samples and small samples based on generative adversarial networks
    Caie Xu
    Dandan Ni
    Bingyan Wang
    Mingyang Wu
    Honghua Gan
    Multimedia Tools and Applications, 2023, 82 : 20197 - 20214
  • [25] A two-stage adversarial Transformer based approach for multivariate industrial time series anomaly detection
    Junfu Chen
    Dechang Pi
    Xixuan Wang
    Applied Intelligence, 2024, 54 : 4210 - 4229
  • [26] Hybrid Model for Network Traffic Anomaly Detection Based on Parallel Two-Stage Feature Fusion
    Ji, Changpeng
    Liu, Huan
    Dai, Wei
    IEEE ACCESS, 2025, 13 : 27310 - 27324
  • [27] A two-stage adversarial Transformer based approach for multivariate industrial time series anomaly detection
    Chen, Junfu
    Pi, Dechang
    Wang, Xixuan
    APPLIED INTELLIGENCE, 2024, 54 (05) : 4210 - 4229
  • [28] Two-stage anomaly detection for positive samples and small samples based on generative adversarial networks
    Xu, Caie
    Ni, Dandan
    Wang, Bingyan
    Wu, Mingyang
    Gan, Honghua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (13) : 20197 - 20214
  • [29] Two-stage Detection Algorithm for RoQ attack Based on Localized Periodicity Analysis of Traffic Anomaly
    Wen, Kun
    Yang, Jiahai
    Cheng, Fengjuan
    Li, Chenxi
    Wang, Ziyu
    Yin, Hui
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [30] Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems
    Skopik, Florian
    Wurzenberger, Markus
    Hoeld, Georg
    Landauer, Max
    Kuhn, Walter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3158 - 3175