Behavioral anomaly detection in dynamic self-organizing systems: a cognitive fusion approach

@article{Jakobson2005BehavioralAD,
  title={Behavioral anomaly detection in dynamic self-organizing systems: a cognitive fusion approach},
  author={G. Jakobson and L. Lewis and J. Buford},
  journal={International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005.},
  year={2005},
  pages={254-259}
}
  • G. Jakobson, L. Lewis, J. Buford
  • Published 2005
  • Computer Science
  • International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005.
  • The detection of, and response to, anomalies is one of the prerequisites of implementing system recovery and adaptation mechanisms in dynamic self-organizing systems. In this paper we propose a cognitive fusion approach to the detection of anomalies appearing in the behavior of dynamic self-organizing systems. Our domain of interest includes sensor networks, mobile ad hoc networks, and tactical battle management. The paper argues for three tiers of processes required for behavioral anomaly… CONTINUE READING
    5 Citations

    References

    SHOWING 1-10 OF 16 REFERENCES
    An Approach to Integrated Cognitive Fusion
    • 18
    • PDF
    Distributed services for information dissemination in self-organizing sensor networks
    • Alvin Lim
    • Computer Science
    • J. Frankl. Inst.
    • 2001
    • 73
    DAMON: a distributed architecture for monitoring multi-hop mobile networks
    • 99
    • PDF
    GRACE: building next generation event correlation services
    • 40
    Adaptation in natural and artificial systems
    • 37,532
    Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence
    • 10,487
    Distributed management by delegation
    • G. Goldszmidt, Y. Yemini
    • Computer Science
    • Proceedings of 15th International Conference on Distributed Computing Systems
    • 1995
    • 305
    Managing Computer Networks: A Case-Based Reasoning Approach
    • 68
    A secure routing protocol for ad hoc networks
    • 1,819
    • PDF
    A survey on sensor networks
    • 14,346
    • PDF