Anomaly Detection Method

An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

Authors: Abdullah H Alqahtani | Published: 2024-04-01
Online Learning
Intrusion Detection System
Anomaly Detection Method

Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems

Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14
IoMT Security
Anomaly Detection Method
Federated Learning

Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques

Authors: Joerg Osterrieder, Stephen Chan, Jeffrey Chu, Yuanyuan Zhang, Branka Hadji Misheva, Codruta Mare | Published: 2024-02-17
Blockchain Technology
Fraudulent Transaction
Anomaly Detection Method

IoT Network Traffic Analysis with Deep Learning

Authors: Mei Liu, Leon Yang | Published: 2024-02-06
Model Performance Evaluation
Deep Learning Method
Anomaly Detection Method

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11
Graph Neural Network
Intrusion Detection System
Anomaly Detection Method

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis

Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker | Published: 2024-01-07
Class Imbalance
Model Performance Evaluation
Anomaly Detection Method

Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids

Authors: Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Model Interpretability
Anomaly Detection Method
Statistical Methods

Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things

Authors: Deepti Gupta, Shafika Showkat Moni, Ali Saman Tosun | Published: 2023-07-25
Anomaly Detection Method
Vehicle Network
Federated Learning

CyPhERS: A Cyber-Physical Event Reasoning System providing real-time situational awareness for attack and fault response

Authors: Nils Müller, Kaibin Bao, Jörg Matthes, Kai Heussen | Published: 2023-05-26
Control Model of CPS
Cyber Attack
Anomaly Detection Method

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla | Published: 2023-04-27
Cyber Attack
Scheduling Method
Anomaly Detection Method