MISA: Online Defense of Trojaned Models using Misattributions Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23 Vulnerability of Adversarial ExamplesAnomaly Detection MethodThreat modeling 2021.03.29 2025.05.28 Literature Database
Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14 Machine LearningAnomaly Detection MethodCommunication Efficiency 2020.12.02 2025.05.28 Literature Database
Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic Authors: Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim | Published: 2020-10-22 Dataset evaluationMachine Learning ApplicationAnomaly Detection Method 2020.10.22 2025.05.28 Literature Database
DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04 DNS Covert ChannelMachine Learning TechnologyAnomaly Detection Method 2020.10.04 2025.05.28 Literature Database
Real-Time Anomaly Detection in Edge Streams Authors: Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, Christos Faloutsos | Published: 2020-09-17 | Updated: 2022-04-25 DDoS AttackData GenerationAnomaly Detection Method 2020.09.17 2025.05.28 Literature Database
PicoDomain: A Compact High-Fidelity Cybersecurity Dataset Authors: Craig Laprade, Benjamin Bowman, H. Howie Huang | Published: 2020-08-20 Data GenerationInformation Leakage AnalysisAnomaly Detection Method 2020.08.20 2025.05.28 Literature Database
Detecting Abnormal Traffic in Large-Scale Networks Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2020-08-13 Multi-Class ClassificationMachine Learning MethodAnomaly Detection Method 2020.08.13 2025.05.28 Literature Database
Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05 Attack DetectionMachine LearningAnomaly Detection Method 2020.08.05 2025.05.28 Literature Database
Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms Authors: Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang | Published: 2020-04-15 Multi-Class ClassificationMachine LearningAnomaly Detection Method 2020.04.15 2025.05.28 Literature Database
Free-riders in Federated Learning: Attacks and Defenses Authors: Jierui Lin, Min Du, Jian Liu | Published: 2019-11-28 FR Detection MechanismFree-Rider AttackAnomaly Detection Method 2019.11.28 2025.05.28 Literature Database