Essays about: "Hidden Markov Models"

Showing result 1 - 5 of 84 essays containing the words Hidden Markov Models.

  1. 1. Intrusion Detection in IT Infrastructures using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Liu; Sabrina Al-Haddad; [2023]
    Keywords : ;

    Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE

  2. 2. Predictive Modeling and Statistical Inference for CTA returns : A Hidden Markov Approach with Sparse Logistic Regression

    University essay from Umeå universitet/Institutionen för matematik och matematisk statistik

    Author : Oskar Fransson; [2023]
    Keywords : Probability theory; Statistical inference; finance; CTA; managed futures; machine learning; statistical learning; stochastic process; sparse logistic regression; Markov Chain Monte Carlo; Hidden Markov model;

    Abstract : This thesis focuses on predicting trends in Commodity Trading Advisors (CTAs), also known as trend-following hedge funds. The paper applies a Hidden Markov Model (HMM) for classifying trends. Additionally, by incorporating additional features, a regularized logistic regression model is used to enhance prediction capability. READ MORE

  3. 3. Hidden Markov Models for Intrusion Detection Under Background Activity

    University essay from KTH/Matematisk statistik

    Author : Robert Siridol-Kjellberg; [2023]
    Keywords : Hidden Markov models; Cyber security; Intrusion detection; Clustering; Background subtraction; Dolda Markovmodeller; Cybersäkerhet; Dataintrång; Klustring; Bakgrundssubtraktion;

    Abstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE

  4. 4. Detecting IT System Intrusions Using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Agaton Domberg; Axel Tardell; [2023]
    Keywords : ;

    Abstract : In today's day and age, the use and implementation of cyber security software isof the utmost importance. Aiming to dive into the basic algorithms behind these softwareprograms, this paper highlights one of the different approaches that keep us safe online. READ MORE

  5. 5. Voltage-Based Multi-step Prediction : Data Labeling, Software Evaluation, and Contrasting DRL with Traditional Prediction Methods

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Joakim Svensson; [2023]
    Keywords : Deep Reinforcement Learning; Multi-step Prediction; Time Series Forecasting; Djup Förstärkningsinlärning; Flerstegsprognos; Tidsserieprognos;

    Abstract : In this project, three primary problems were addressed to improve battery data management and software performance evaluation. All solutions used voltage values in time together with various device characteristics. Battery replacement labeling was performed using Hidden Markov Models. READ MORE