Sökning: "Anomaly detection"
Visar resultat 1 - 5 av 186 uppsatser innehållade orden Anomaly detection.
- Master-uppsats, Göteborgs universitet/Institutionen för matematiska vetenskaper
Sammanfattning : AbstractSoftware development with continuous integration changes needs frequent testing forassessment. Analyzing the test output manually is time-consuming and automatingthis process could be beneficial to an organization. LÄS MER
- Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik
Sammanfattning : Advancements in today's technology has motivated invention of faster mobile communication systems. The fifth generation mobile network, 5G, is the latest version made by the third generation partnership project (3GPP) and expects to both increase connection speed and reduce latency, which eventually will make it applicable in supporting state-of-the art technologies such as virtual reality and self-driving vehicles among others. LÄS MER
- Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap
Sammanfattning : Background: Apache Cassandra is a highly scalable distributed system that can handle large amounts of data through several nodes / virtual machines grouped together as Apache Cassandra clusters. When one such node in an Apache Cassandra cluster is down, there is a need for a tool or an approach that can identify this failed virtual machine by analyzing the data generated from each of the virtual machines in the cluster. LÄS MER
- Magister-uppsats, Mälardalens högskola/Akademin för innovation, design och teknik
Sammanfattning : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. LÄS MER
- Magister-uppsats, Blekinge Tekniska Högskola/Fakulteten för datavetenskaper
Sammanfattning : Context: Log files are produced in most larger computer systems today which contain highly valuable information about the behavior of the system and thus they are consulted fairly often in order to analyze behavioral aspects of the system. Because of the very high number of log entries produced in some systems, it is however extremely difficult to seek out relevant information in these files. LÄS MER