Mobility-Based Anomaly Detection

Mobility-Based Anomaly Detection PDF Author: Yanan Xin
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Mobility data are proliferating at an unprecedented rate due to the ubiquitous GPS sensing and tracking. The increased availability of mobility data gives rise to numerous applications ranging from urban traffic monitoring to participatory environmental sensing. Detecting anomalies observed in mobility data (specified here as mobility-based anomaly detection) has attracted significant attention from researchers and practitioners in various fields due to its significant real-world impact. For example, traffic anomalies are used for traffic accident monitoring, and anomalies in environmental mobile sensing data are used to signal potential natural hazards. Despite a large number of studies available on mobility-based anomaly detection, many of the studies are conducted in distinctly different fields and have not been examined under a unified framework. This dissertation provides a systematic investigation of mobility-based anomaly detection to fill this knowledge gap. I propose a taxonomy of mobility-based anomaly detection to organize the existing relevant studies into three categories based on the source and target attributes of mobility data used in the anomaly detection process: (1) utilizing mobility attributes as both source and target in anomaly detection (mobility to mobility anomaly detection), (2) utilizing mobility attributes as the source and non-mobility attributes as the target (mobility to non-mobility anomaly detection), and (3) utilizing non-mobility attributes as the source and mobility attributes as the target (non-mobility to mobility anomaly detection). Following the taxonomy, three individual studies are presented, with each providing an example for one of the three categories. The first study (an example of mobility to mobility anomaly detection) identifies anomalous patterns of shared dockless e-scooters using an unsupervised deep learning approach. The second study (an example of mobility to non-mobility anomaly detection) detects anomalies in crowdsourced radiation measurements. The third study (an example of non-mobility to mobility anomaly detection) models the atypical event travel patterns of football fans using geolocated tweets. The three studies develop new methods in addressing the challenges of mobility-based anomaly detection and provide insights into the specific application domain. The dissertation provides one of the first systematic efforts to address mobility-based anomaly detection generally and highlights challenges and opportunities for future research.

Mobility-Based Anomaly Detection

Mobility-Based Anomaly Detection PDF Author: Yanan Xin
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Mobility data are proliferating at an unprecedented rate due to the ubiquitous GPS sensing and tracking. The increased availability of mobility data gives rise to numerous applications ranging from urban traffic monitoring to participatory environmental sensing. Detecting anomalies observed in mobility data (specified here as mobility-based anomaly detection) has attracted significant attention from researchers and practitioners in various fields due to its significant real-world impact. For example, traffic anomalies are used for traffic accident monitoring, and anomalies in environmental mobile sensing data are used to signal potential natural hazards. Despite a large number of studies available on mobility-based anomaly detection, many of the studies are conducted in distinctly different fields and have not been examined under a unified framework. This dissertation provides a systematic investigation of mobility-based anomaly detection to fill this knowledge gap. I propose a taxonomy of mobility-based anomaly detection to organize the existing relevant studies into three categories based on the source and target attributes of mobility data used in the anomaly detection process: (1) utilizing mobility attributes as both source and target in anomaly detection (mobility to mobility anomaly detection), (2) utilizing mobility attributes as the source and non-mobility attributes as the target (mobility to non-mobility anomaly detection), and (3) utilizing non-mobility attributes as the source and mobility attributes as the target (non-mobility to mobility anomaly detection). Following the taxonomy, three individual studies are presented, with each providing an example for one of the three categories. The first study (an example of mobility to mobility anomaly detection) identifies anomalous patterns of shared dockless e-scooters using an unsupervised deep learning approach. The second study (an example of mobility to non-mobility anomaly detection) detects anomalies in crowdsourced radiation measurements. The third study (an example of non-mobility to mobility anomaly detection) models the atypical event travel patterns of football fans using geolocated tweets. The three studies develop new methods in addressing the challenges of mobility-based anomaly detection and provide insights into the specific application domain. The dissertation provides one of the first systematic efforts to address mobility-based anomaly detection generally and highlights challenges and opportunities for future research.

Algorithms for Context-sensitive Prediction, Optimization and Anomaly Detection in Urban Mobility

Algorithms for Context-sensitive Prediction, Optimization and Anomaly Detection in Urban Mobility PDF Author: Fangzhou Sun
Publisher:
ISBN:
Category : Electronic dissertations
Languages : en
Pages : 144

Get Book Here

Book Description


Computational Intelligence in the Internet of Things

Computational Intelligence in the Internet of Things PDF Author: Purnomo, Hindriyanto Dwi
Publisher: IGI Global
ISBN: 1522579567
Category : Computers
Languages : en
Pages : 342

Get Book Here

Book Description
In recent years, the need for smart equipment has increased exponentially with the upsurge in technological advances. To work to their fullest capacity, these devices need to be able to communicate with other devices in their network to exchange information and receive instructions. Computational Intelligence in the Internet of Things is an essential reference source that provides relevant theoretical frameworks and the latest empirical research findings in the area of computational intelligence and the Internet of Things. Featuring research on topics such as data analytics, machine learning, and neural networks, this book is ideally designed for IT specialists, managers, professionals, researchers, and academicians.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks PDF Author: Muhammad Usman
Publisher: Springer
ISBN: 9811074674
Category : Computers
Languages : en
Pages : 154

Get Book Here

Book Description
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Metaheuristic Algorithms in Industry 4.0

Metaheuristic Algorithms in Industry 4.0 PDF Author: Pritesh Shah
Publisher: CRC Press
ISBN: 1000435989
Category : Computers
Languages : en
Pages : 302

Get Book Here

Book Description
Due to increasing industry 4.0 practices, massive industrial process data is now available for researchers for modelling and optimization. Artificial Intelligence methods can be applied to the ever-increasing process data to achieve robust control against foreseen and unforeseen system fluctuations. Smart computing techniques, machine learning, deep learning, computer vision, for example, will be inseparable from the highly automated factories of tomorrow. Effective cybersecurity will be a must for all Internet of Things (IoT) enabled work and office spaces. This book addresses metaheuristics in all aspects of Industry 4.0. It covers metaheuristic applications in IoT, cyber physical systems, control systems, smart computing, artificial intelligence, sensor networks, robotics, cybersecurity, smart factory, predictive analytics and more. Key features: Includes industrial case studies. Includes chapters on cyber physical systems, machine learning, deep learning, cybersecurity, robotics, smart manufacturing and predictive analytics. surveys current trends and challenges in metaheuristics and industry 4.0. Metaheuristic Algorithms in Industry 4.0 provides a guiding light to engineers, researchers, students, faculty and other professionals engaged in exploring and implementing industry 4.0 solutions in various systems and processes.

Computational Science - ICCS 2007

Computational Science - ICCS 2007 PDF Author: Yong Shi
Publisher: Springer Science & Business Media
ISBN: 354072589X
Category : Computers
Languages : en
Pages : 1247

Get Book Here

Book Description
Part of a four-volume set, this book constitutes the refereed proceedings of the 7th International Conference on Computational Science, ICCS 2007, held in Beijing, China in May 2007. The papers cover a large volume of topics in computational science and related areas, from multiscale physics to wireless networks, and from graph theory to tools for program development.

Recent Advances in Intrusion Detection

Recent Advances in Intrusion Detection PDF Author: Engin Kirda
Publisher: Springer Science & Business Media
ISBN: 3642043410
Category : Business & Economics
Languages : en
Pages : 395

Get Book Here

Book Description
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23–25. As in the past, the symposium brought together leading - searchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were six main sessions prese- ingfullresearchpapersonanomalyandspeci?cation-basedapproaches,malware detection and prevention, network and host intrusion detection and prevention, intrusion detection for mobile devices, and high-performance intrusion det- tion. Furthermore, there was a poster session on emerging research areas and case studies. The RAID 2009ProgramCommittee received59 full paper submissionsfrom all over the world. All submissions were carefully reviewed by independent - viewers on the basis of space, topic, technical assessment, and overall balance. The ?nal selection took place at the Program Committee meeting on May 21 in Oakland, California. In all, 17 papers were selected for presentation and p- lication in the conference proceedings. As a continued feature, the symposium accepted submissions for poster presentations which have been published as - tended abstracts, reporting early-stage research, demonstration of applications, or case studies. Thirty posters were submitted for a numerical review by an independent, three-person sub-committee of the Program Committee based on novelty, description, and evaluation. The sub-committee recommended the - ceptance of 16 of these posters for presentation and publication. The success of RAID 2009 depended on the joint e?ort of many people.

Anomally Detection Techniques for Ad Hoc Networks

Anomally Detection Techniques for Ad Hoc Networks PDF Author: Chaoli Cai
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 280

Get Book Here

Book Description
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure.

Business Information Systems Workshops

Business Information Systems Workshops PDF Author: Witold Abramowicz
Publisher: Springer
ISBN: 331969023X
Category : Computers
Languages : en
Pages : 308

Get Book Here

Book Description
This book contains revised papers from the three workshops and two accompanying events that took place at the 20th International Conference on Business Information Systems, BIS 2017, held in Poznan, Poland, in June 2017. The workshops included in this volume are: * The 9th Workshop on Applications of Knowledge-Based Technologies in Business – AKTB 2017 accepted 9 papers from 16 submissions and featured 1 invited paper. * The 8th Workshop on Business and IT Alignment - BITA 2017 selected 5 papers from 10 submissions. * The 1st Workshop on Sustainable Energy Systems, Smart Infrastructures, and Smart Environments – SESSISE 2017 selected 2 papers for inclusion in this book. In addition, BIS hosted a Doctoral Consortium from which 5 papers are included. Furthermore, two contributions from the Second National Congress on Information Systems, which took place during BIS, are included. The volume ends with an invited paper presented during a special session of the main BIS conference.

Knowledge-Based Intelligent Information and Engineering Systems

Knowledge-Based Intelligent Information and Engineering Systems PDF Author: Bogdan Gabrys
Publisher: Springer Science & Business Media
ISBN: 3540465359
Category : Business & Economics
Languages : en
Pages : 1360

Get Book Here

Book Description
The three volume set LNAI 4251, LNAI 4252, and LNAI 4253 constitutes the refereed proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006, held in Bournemouth, UK in October 2006. The 480 revised papers presented were carefully reviewed and selected from about 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing.