Articles with "normal behavior" as a keyword



TeRed: Normal Behavior-Based Efficient Provenance Graph Reduction for Large-Scale Attack Forensics

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3601381

Abstract: System intrusions, particularly Advanced Persistent Threats (APTs), pose significant threats to enterprises and organizations. Provenance graph-based attack detection and investigation methods are crucial for defending against these intrusions. To detect various attacks, security systems collect… read more here.

Keywords: normal behavior; attack; reduction; provenance ... See more keywords

A Normal Behavior Model Based on Power Curve and Stacked Regressions for Condition Monitoring of Wind Turbines

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Instrumentation and Measurement"

DOI: 10.1109/tim.2022.3196116

Abstract: Wind turbines (WTs) are complex systems composed of multiple components. In order to assess the overall condition of a given WT, one may need to employ multiple models; such a solution, however, is deemed to… read more here.

Keywords: power curve; behavior model; wind turbines; normal behavior ... See more keywords