Comparison Study Among Various Anomaly Detection Techniques

Abstract

Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anomaly detection. Now a days variety of anomaly detection techniques are available because of this it is very difficult to compare the advantages and disadvantages of these methods .To know this ,different anomaly detection are reviewed and make a detailed study in this. This paper contains a comparison study of different anomaly detection techniques and identification of their merits and demerits.

Authors and Affiliations

DEVIKA U K, Mrs. DIVYA SUNNY

Keywords

Related Articles

Logo Matching And Recognition System Using Surf

Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...

A Mustang Security User Authentication Scheme Based On Graphical Password

In all computer security contexts, User authentication is an essential thing. The most popular and simple type of user authentication method is to use the alphanumeric passwords. The reasons behind why we are using a...

Design Of A Rceat Architecture For Detecting Multi- Bit Error In RFID

Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences...

Novel Approach To Adaptive Opportunistic Routing For Wireless Adhoc Networks

A wireless ad hoc network is a decentralized type of wireless network. If the network is adhoc since it does not rely on a pre accessible infrastructure, such as routers in wired networks and access points in managed...

Attribute Sparse Coding (ASC’s) for Content-Based Image Retrieval (CBIR)

Photographs with individuals are the foremost attention of users. Consequently with the exponentially increasing pictures, large-scale content-based face image retrieval is a facilitating knowledge for various develo...

Download PDF file
  • EP ID EP27891
  • DOI -
  • Views 237
  • Downloads 0

How To Cite

DEVIKA U K, Mrs. DIVYA SUNNY (2014). Comparison Study Among Various Anomaly Detection Techniques. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk./articles/-A-27891