scispace - formally typeset
Search or ask a question
Author

Tuomo Sipola

Bio: Tuomo Sipola is an academic researcher from JAMK University of Applied Sciences. The author has contributed to research in topics: Dimensionality reduction & Cluster analysis. The author has an hindex of 9, co-authored 26 publications receiving 273 citations. Previous affiliations of Tuomo Sipola include Information Technology University & University of Jyväskylä.

Papers
More filters
Journal ArticleDOI
TL;DR: A framework to find abnormal behavior from these logs to find intrusions from high-dimensional datasets in real time is proposed and results are useful when designing next generation intrusion detection systems.

73 citations

Journal ArticleDOI
TL;DR: Support to absence ratio of Hilbert-Huang Transformation on mismatch negativity meets the theoretical expectations, i.e., the more deviant stimulus elicits larger MMN, however, Morlet wavelet transformation does not reveal that, and HHT seems more appropriate in analyzing event-related potentials in the time-frequency domain.
Abstract: Compared to the waveform or spectrum analysis of event-related potentials (ERPs), time-frequency representation (TFR) has the advantage of revealing the ERPs time and frequency domain information simultaneously. As the human brain could be modeled as a complicated nonlinear system, it is interesting from the view of psychological knowledge to study the performance of the nonlinear and linear time-frequency representation methods for ERP research. In this study Hilbert-Huang transformation (HHT) and Morlet wavelet transformation (MWT) were performed on mismatch negativity (MMN) of children. Participants were 102 children aged 8–16 years. MMN was elicited in a passive oddball paradigm with duration deviants. The stimuli consisted of an uninterrupted sound including two alternating 100 ms tones (600 and 800 Hz) with infrequent 50 ms or 30 ms 600 Hz deviant tones. In theory larger deviant should elicit larger MMN. This theoretical expectation is used as a criterion to test two TFR methods in this study. For statistical analysis MMN support to absence ratio (SAR) could be utilized to qualify TFR of MMN. Compared to MWT, the TFR of MMN with HHT was much sharper, sparser, and clearer. Statistically, SAR showed significant difference between the MMNs elicited by two deviants with HHT but not with MWT, and the larger deviant elicited MMN with larger SAR. Support to absence ratio of Hilbert-Huang Transformation on mismatch negativity meets the theoretical expectations, i.e., the more deviant stimulus elicits larger MMN. However, Morlet wavelet transformation does not reveal that. Thus, HHT seems more appropriate in analyzing event-related potentials in the time-frequency domain. HHT appears to evaluate ERPs more accurately and provide theoretically valid information of the brain responses.

40 citations

Journal ArticleDOI
TL;DR: Pre-processing the f MRI data by using a reasonable band-pass digital filter can greatly benefit the following model order selection and ICA with fMRI data by naturalistic paradigms.

31 citations

Book ChapterDOI
15 Sep 2011
TL;DR: This study detects anomalous queries from network logs using a dimensionality reduction framework that is adaptive and thus does not need training before analysis.
Abstract: The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done by applying diffusion maps. The method is adaptive and thus does not need training before analysis. We tested the method with data that includes normal and intrusive traffic to a web server. This approach finds all intrusions in the dataset.

29 citations

Proceedings ArticleDOI
01 Oct 2012
TL;DR: A framework that preprocesses and analyzes server log files to detect intrusions and could be used as a real-time anomaly detection system in any network where sufficient data is available.
Abstract: Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then be analyzed in more detail. We expand our previous work by elaborating the cluster analysis after obtaining the low-dimensional representation. The framework was tested with actual server log data collected from a large web service. Several previously unknown intrusions were found. Proposed methods could be customized to analyze any kind of log data. The system could be used as a real-time anomaly detection system in any network where sufficient data is available.

20 citations


Cited by
More filters
01 Jan 2002

9,314 citations

01 Jan 2016
TL;DR: This is an introduction to the event related potential technique, which can help people facing with some malicious bugs inside their laptop to read a good book with a cup of tea in the afternoon.
Abstract: Thank you for downloading an introduction to the event related potential technique. Maybe you have knowledge that, people have look hundreds times for their favorite readings like this an introduction to the event related potential technique, but end up in malicious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they are facing with some malicious bugs inside their laptop.

2,445 citations

01 Nov 2004
TL;DR: In this article, the authors presented a new map representing the structure of all of science, based on journal articles, including both the natural and social sciences, which provides a bird's eye view of today's scientific landscape.
Abstract: This paper presents a new map representing the structure of all of science, based on journal articles, including both the natural and social sciences. Similar to cartographic maps of our world, the map of science provides a bird's eye view of today's scientific landscape. It can be used to visually identify major areas of science, their size, similarity, and interconnectedness. In order to be useful, the map needs to be accurate on a local and on a global scale. While our recent work has focused on the former aspect, this paper summarizes results on how to achieve structural accuracy. Eight alternative measures of journal similarity were applied to a data set of 7,121 journals covering over 1 million documents in the combined Science Citation and Social Science Citation Indexes. For each journal similarity measure we generated two-dimensional spatial layouts using the force-directed graph layout tool, VxOrd. Next, mutual information values were calculated for each graph at different clustering levels to give a measure of structural accuracy for each map. The best co-citation and inter-citation maps according to local and structural accuracy were selected and are presented and characterized. These two maps are compared to establish robustness. The inter-citation map is more » then used to examine linkages between disciplines. Biochemistry appears as the most interdisciplinary discipline in science. « less

702 citations

Journal ArticleDOI
TL;DR: It was found that in a large number of different neuropsychiatric, neurological and neurodevelopmental disorders, as well as in normal ageing, the MMN amplitude was attenuated and peak latency prolonged and appears to index cognitive decline irrespective of the specific symptomatologies and aetiologies of the different disorders involved.

346 citations