Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22 Model InversionAnomaly Detection Algorithmloss of Interpretability 2025.05.22 2025.05.28 Literature Database
Anomaly Detection using Principles of Human Perception Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13 Data Extraction and AnalysisAnomaly Detection AlgorithmStatistical Methods 2021.03.23 2025.05.28 Literature Database
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04 Machine LearningDeep LearningAnomaly Detection Algorithm 2020.12.04 2025.05.28 Literature Database
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22 Adversarial attackSelection and Evaluation of Optimization AlgorithmsAnomaly Detection Algorithm 2020.04.22 2025.05.28 Literature Database
A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2019-10-22 Sensor Information ManagementPerformance Evaluation MetricsAnomaly Detection Algorithm 2019.10.22 2025.05.28 Literature Database
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 Dataset AnalysisModel EvaluationAnomaly Detection Algorithm 2019.05.28 2025.05.28 Literature Database
Process Monitoring on Sequences of System Call Count Vectors Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12 Data CollectionMachine Learning ApplicationAnomaly Detection Algorithm 2017.07.12 2025.05.28 Literature Database
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30 Data CollectionUser Behavior AnalysisAnomaly Detection Algorithm 2017.06.30 2025.05.28 Literature Database
Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway Authors: Veronica del Carmen Estrada | Published: 2017-06-10 TCP Session ManagementData CollectionAnomaly Detection Algorithm 2017.06.10 2025.05.28 Literature Database