A Protocol-Aware P4 Pipeline for MQTT Security and Anomaly Mitigation in Edge IoT Systems Authors: Bui Ngoc Thanh Binh, Pham Hoai Luan, Le Vu Trung Duong, Vu Tuan Hai, Yasuhiko Nakashima | Published: 2026-01-12 Intrusion Detection SystemPerformance EvaluationAnomaly Detection Method 2026.01.12 2026.01.14 Literature Database
Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15 Backdoor AttackAnomaly Detection MethodVulnerability Assessment Method 2025.12.15 2025.12.17 Literature Database
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs Authors: Ahmed Aly, Essam Mansour, Amr Youssef | Published: 2025-10-16 | Updated: 2025-10-20 APT攻撃調査GNNベースの異常検知Anomaly Detection Method 2025.10.16 2025.10.22 Literature Database
ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25 XAI (Explainable AI)Network Threat DetectionAnomaly Detection Method 2025.09.25 2025.09.27 Literature Database
Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges, and Solutions Authors: Qinnan Hu, Yuntao Wang, Yuan Gao, Zhou Su, Linkang Du | Published: 2025-09-11 Relationship of AI Systems倫理基準遵守Anomaly Detection Method 2025.09.11 2025.09.13 Literature Database
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017 Authors: Zhaoyang Xu, Yunbo Liu | Published: 2025-06-23 | Updated: 2025-08-11 Certified RobustnessPerformance Evaluation MethodAnomaly Detection Method 2025.06.23 2025.08.13 Literature Database
Reframing Threat Detection: Inside esINSIDER Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07 Data Origins and EvolutionInternal Network ReconnaissanceAnomaly Detection Method 2019.04.07 2025.05.28 Literature Database
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13 Phishing DetectionFeature InterdependenceAnomaly Detection Method 2019.03.13 2025.05.28 Literature Database
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13 FDI Attack Detection MethodsPerformance EvaluationAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
A Grid Based Adversarial Clustering Algorithm Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21 Data Contamination DetectionAdversarial Attack AnalysisAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database