An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks Authors: Abdullah H Alqahtani | Published: 2024-04-01 Online LearningIntrusion Detection SystemAnomaly Detection Method 2024.04.01 2025.05.27 Literature Database
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14 IoMT SecurityAnomaly Detection MethodFederated Learning 2024.03.14 2025.05.27 Literature Database
Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques Authors: Joerg Osterrieder, Stephen Chan, Jeffrey Chu, Yuanyuan Zhang, Branka Hadji Misheva, Codruta Mare | Published: 2024-02-17 Blockchain TechnologyFraudulent TransactionAnomaly Detection Method 2024.02.17 2025.05.27 Literature Database
IoT Network Traffic Analysis with Deep Learning Authors: Mei Liu, Leon Yang | Published: 2024-02-06 Model Performance EvaluationDeep Learning MethodAnomaly Detection Method 2024.02.06 2025.05.27 Literature Database
Use of Graph Neural Networks in Aiding Defensive Cyber Operations Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11 Graph Neural NetworkIntrusion Detection SystemAnomaly Detection Method 2024.01.11 2025.05.27 Literature Database
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker | Published: 2024-01-07 Class ImbalanceModel Performance EvaluationAnomaly Detection Method 2024.01.07 2025.05.27 Literature Database
Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids Authors: Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig | Published: 2023-12-21 Model InterpretabilityAnomaly Detection MethodStatistical Methods 2023.12.21 2025.05.27 Literature Database
Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things Authors: Deepti Gupta, Shafika Showkat Moni, Ali Saman Tosun | Published: 2023-07-25 Anomaly Detection MethodVehicle NetworkFederated Learning 2023.07.25 2025.05.28 Literature Database
CyPhERS: A Cyber-Physical Event Reasoning System providing real-time situational awareness for attack and fault response Authors: Nils Müller, Kaibin Bao, Jörg Matthes, Kai Heussen | Published: 2023-05-26 Control Model of CPSCyber AttackAnomaly Detection Method 2023.05.26 2025.05.28 Literature Database
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla | Published: 2023-04-27 Cyber AttackScheduling MethodAnomaly Detection Method 2023.04.27 2025.05.28 Literature Database