Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31 Data CollectionEncrypted Traffic DetectionAnomaly Detection Method 2023.01.31 2025.05.28 Literature Database
A White-Box Adversarial Attack Against a Digital Twin Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25 Cyber AttackAdversarial TrainingAnomaly Detection Method 2022.10.25 2025.05.28 Literature Database
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12 Data Contamination DetectionAnomaly Detection MethodVehicle Network Security 2022.04.23 2025.05.28 Literature Database
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21 Privacy Protection MethodFundamentals of Machine LearningAnomaly Detection Method 2022.04.21 2025.05.28 Literature Database
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17 Characteristics of APT AttacksSecurity AnalysisAnomaly Detection Method 2022.04.07 2025.05.28 Literature Database
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25 Deep Learning-Based IDSAnomaly Detection MethodAutomotive Network Security 2022.01.31 2025.05.28 Literature Database
An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data Authors: Xinze Li, Baixi Zou | Published: 2021-09-28 Data Extraction and AnalysisData-Driven ClusteringAnomaly Detection Method 2021.09.28 2025.05.28 Literature Database
Modern Cybersecurity Solution using Supervised Machine Learning Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15 Performance EvaluationMachine Learning ApplicationAnomaly Detection Method 2021.09.15 2025.05.28 Literature Database
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis Authors: Chuanpu Fu, Qi Li, Meng Shen, Ke Xu | Published: 2021-06-28 | Updated: 2021-09-16 Feature Extraction MethodAnomaly Detection MethodCommunication Analysis 2021.06.28 2025.05.28 Literature Database
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 ML-Based IDSMachine Learning MethodAnomaly Detection Method 2021.03.31 2025.05.28 Literature Database