· @glennmaxwell1002
0 followers · 1960 posts · Server mastodon.cloud

Smart Communities

AvidBeam offers innovative video analytics solutions for face recognition, traffic violation, license plate recognition, behavior analysis, and anomaly detection

Visit Us:- avidbeam.com/products/

#computervision #VideoSearch #facerecognition #arabiclicenseplaterecognition #licenseplaterecognition #behavioranalysis #anomalydetection

Last updated 2 years ago

Hackernoon · @hackernoon_bot
396 followers · 7287 posts · Server social.platypush.tech

#anomalydetection #python

Last updated 2 years ago

Marcin Paprzycki · @marcinpaprzycki
6 followers · 129 posts · Server masto.ai

Proposing a privacy-friendly water leakage detection approach for various kind of water meters (optical and digital) performed on a very constrained, wireless devices in: “Anomaly detection on compressed data in resource-constrained smart water meters“ by Sarah Klein, Anna Hristoskova, Annanda Rath, Renaud Gonce. Proceedings of the 17th Conference on Computer Science and Intelligence Systems: ACSIS, Vol. 30, pages 635–639 (2022).

Open Access: tinyurl.com/2p9j8j36

#iot #anomalydetection

Last updated 3 years ago

David G. Simmons · @davidgs
167 followers · 135 posts · Server tty0.social

Calling all data wizards! Join us for a weekend of innovation and problem-solving at our anomaly detection hackathon. Show off your skills, learn new ones, and win awesome prizes. Register now at meetup.com/apache-pinot/events

#anomalydetection #hackathon #datascience

Last updated 3 years ago

Gustavo · @gustavo_iiot
31 followers · 6 posts · Server mathstodon.xyz
Gerry Gosselin :donor: · @snafui
36 followers · 71 posts · Server infosec.exchange

Anyone have a good resources on statistical analysis of pcap data for anomaly detection?

I made a Raspberry Pi WAP specifically for IoT devices to connect to. My intention was to use it for capturing pcaps of IoT traffic to look for vulnerabilities or discover firmware download sites. So far it’s boring because everything is MQTT. However, the subject of anomalous network activity detection seems intriguing to me. My wife’s a statistician and has been looking for a reason to learn R so I feel like between the two of us this may be a fun family project 🙃. Unfortunately, I literally have no idea where to start. Resources I’ve found with search terms that include “network” are more about social graph networking and not packets. Anyone have any thoughts? Books, scholarly articles, blogs, anything will help. Thanks!

#iot #anomalydetection #statistics #threathunting

Last updated 3 years ago

Gerry Gosselin :donor: · @snafui
36 followers · 68 posts · Server infosec.exchange

Anyone have a good resources on statistical analysis of pcap data for anomaly detection?

I made a Raspberry Pi WAP specifically for IoT devices to connect to. My intention was to use it for capturing pcaps of IoT traffic to look for vulnerabilities or discover firmware download sites. So far it’s boring because everything is MQTT. However, the subject of anomalous network activity detection seems intriguing to me. My wife’s a statistician and had been looking for a reason to learn R so I feel like between the two of us this may be a fun family project 🙃. Unfortunately, I literally have no idea where to start. Resources I’ve found with search terms that include “network” are more about social graph networking and not packets. Anyone have any thoughts? Books, scholarly articles, blogs, anything will help. Thanks!

#iot #anomalydetection #statistics #threathunting

Last updated 3 years ago

_Veronica_ · @verovaleros
213 followers · 65 posts · Server infosec.exchange

If you ever used our @stratosphere malware datasets, we have good news! Under my direction, we will be actively working on improving all our datasets to make them better and more accessible to the community.

These datasets are unique in many ways and we look to make them even better.

If you have suggestions, ideas, would-be-nice comments, use cases, or any comments in general we would love to hear about it!

These datasets were initially created to aid machine learning researchers in developing new and better models to identify malicious behaviors in the network. When we started, there were few datasets out there with real malware network traffic that lasted longer than just a few minutes.

mcfp.felk.cvut.cz/publicDatase

#networksecurity #malwaretraffic #machinelearning #datascience #cybersecurity #maliciousbehaviors #datasets #networktrafficanalysis #ml #anomalydetection

Last updated 3 years ago

Josh Hill 📈 · @jbhill
23 followers · 54 posts · Server social.linux.pizza

The number of papers is beginning to exceed the number of actual papers in some areas of .

#graph #rstats #anomalydetection #research #literaturereview

Last updated 3 years ago

Hackernoon · @hackernoon_bot
164 followers · 5635 posts · Server social.platypush.tech
Marko Jahnke · @markojahnke
66 followers · 227 posts · Server bonn.social

In the early 2000s, a student and myself developed an /#IDXP compliant security event message pipelining framework for collecting and consolidating messages from network , and products.

In the messages stream, we were able to match multi-stage in near real-time (in-memory), before everything was stored in central database. Structural graph-based was developed later by some colleagues.

We called it .

#cs #IDMEF #ids #EDR #correlation #DetectionRules #anomalydetection #MetaIDS

Last updated 4 years ago