A design-driven sonification process for supporting expert users in real-time anomaly detection: Towards applied guidelines.
Sara LenziGinevra TerenghiAitor Moreno-Fernandez-de-LecetaPublished in: EAI Endorsed Trans. Creative Technol. (2020)
Keyphrases
- anomaly detection
- intrusion detection
- design process
- network traffic
- detecting anomalies
- anomalous behavior
- network intrusion detection
- behavior analysis
- cumulative sum
- network security
- computer security
- network anomaly detection
- unsupervised anomaly detection
- clustering algorithm
- malware detection
- intrusion detection system
- unsupervised learning