A critical literature survey and prospects on tampering and anomaly detection in image data.
Kelton A. P. da CostaJoão P. PapaLeandro A. PassosDanilo ColomboJavier Del SerKhan MuhammadVictor Hugo C. de AlbuquerquePublished in: Appl. Soft Comput. (2020)
Keyphrases
- anomaly detection
- image data
- intrusion detection
- anomalous behavior
- network intrusion detection
- network traffic
- detecting anomalies
- intrusion detection system
- network anomaly detection
- network security
- behavior analysis
- unsupervised anomaly detection
- unsupervised learning
- computer security
- negative selection algorithm
- one class support vector machines
- evolutionary algorithm
- detecting anomalous
- connectionist systems
- learning algorithm
- cumulative sum
- feature extraction