Securing WiFi Fingerprint-based Indoor Localization Systems from Malicious Access Points Authors: Fariha Tanjim Shifat, Sayma Sarwar Ela, Mosarrat Jahan | Published: 2025-05-12 Reliability AssessmentMachine Learning TechnologyAnomaly Detection Method 2025.05.12 2025.05.28 Literature Database
Quantum Support Vector Regression for Robust Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Sebastian Issel, Pascal Debus | Published: 2025-05-02 | Updated: 2025-05-13 Certified RobustnessAnomaly Detection MethodRole of Quantum Machine Learning 2025.05.02 2025.05.28 Literature Database
Quantum Autoencoder for Multivariate Time Series Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Afrae Ahouzi, Pallavi Bhardwaj, Kaweh Amoi-Taleghani, Michael Schrödl-Baumann, Pascal Debus | Published: 2025-04-24 Multivariate Time Series AnalysisAnomaly Detection MethodQuantum Computing Method 2025.04.24 2025.05.27 Literature Database
A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications Authors: Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong | Published: 2024-06-08 LLM Performance EvaluationCybersecurityAnomaly Detection Method 2024.06.08 2025.05.27 Literature Database
A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-05-18 | Updated: 2024-09-15 Model Performance EvaluationAnomaly Detection MethodEvaluation Method 2024.05.18 2025.05.27 Literature Database
PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks Authors: Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma | Published: 2024-05-09 LLM SecurityCybersecurityAnomaly Detection Method 2024.05.09 2025.05.27 Literature Database
Intrusion Detection at Scale with the Assistance of a Command-line Language Model Authors: Jiongliang Lin, Yiwen Guo, Hao Chen | Published: 2024-04-20 Command AnalysisAnomaly Detection MethodAutomated Intrusion Detection System 2024.04.20 2025.05.27 Literature Database
LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks Authors: Abdullah H Alqahtani | Published: 2024-04-01 Online LearningIntrusion Detection SystemAnomaly Detection Method 2024.04.01 2025.05.27 Literature Database
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14 IoMT SecurityAnomaly Detection MethodFederated Learning 2024.03.14 2025.05.27 Literature Database