Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques Authors: Joerg Osterrieder, Stephen Chan, Jeffrey Chu, Yuanyuan Zhang, Branka Hadji Misheva, Codruta Mare | Published: 2024-02-17 Blockchain TechnologyFraudulent TransactionAnomaly Detection Method 2024.02.17 2025.05.27 Literature Database
IoT Network Traffic Analysis with Deep Learning Authors: Mei Liu, Leon Yang | Published: 2024-02-06 Model Performance EvaluationDeep Learning MethodAnomaly Detection Method 2024.02.06 2025.05.27 Literature Database
Use of Graph Neural Networks in Aiding Defensive Cyber Operations Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11 Graph Neural NetworkIntrusion Detection SystemAnomaly Detection Method 2024.01.11 2025.05.27 Literature Database
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker | Published: 2024-01-07 Class ImbalanceModel Performance EvaluationAnomaly Detection Method 2024.01.07 2025.05.27 Literature Database
Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids Authors: Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig | Published: 2023-12-21 Model InterpretabilityAnomaly Detection MethodStatistical Methods 2023.12.21 2025.05.27 Literature Database
Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things Authors: Deepti Gupta, Shafika Showkat Moni, Ali Saman Tosun | Published: 2023-07-25 Anomaly Detection MethodVehicle NetworkFederated Learning 2023.07.25 2025.05.28 Literature Database
CyPhERS: A Cyber-Physical Event Reasoning System providing real-time situational awareness for attack and fault response Authors: Nils Müller, Kaibin Bao, Jörg Matthes, Kai Heussen | Published: 2023-05-26 Control Model of CPSCyber AttackAnomaly Detection Method 2023.05.26 2025.05.28 Literature Database
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla | Published: 2023-04-27 Cyber AttackScheduling MethodAnomaly Detection Method 2023.04.27 2025.05.28 Literature Database
Blockchain Large Language Models Authors: Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais | Published: 2023-04-25 | Updated: 2023-04-29 Membership InferenceIntrusion Detection SystemAnomaly Detection Method 2023.04.25 2025.05.28 Literature Database
Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data Authors: Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore | Published: 2023-04-21 DDoS Attack DetectionTraining ProtocolAnomaly Detection Method 2023.04.21 2025.05.28 Literature Database