Anomaly Detection Method

Reframing Threat Detection: Inside esINSIDER

Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07
Data Origins and Evolution
Internal Network Reconnaissance
Anomaly Detection Method

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13
Phishing Detection
Feature Interdependence
Anomaly Detection Method

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13
FDI Attack Detection Methods
Performance Evaluation
Anomaly Detection Method

A Grid Based Adversarial Clustering Algorithm

Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21
Data Contamination Detection
Adversarial Attack Analysis
Anomaly Detection Method

Machine Learning DDoS Detection for Consumer Internet of Things Devices

Authors: Rohan Doshi, Noah Apthorpe, Nick Feamster | Published: 2018-04-11
Model DoS
IoT Threat Detection in Home Routers
Anomaly Detection Method

The Challenges in SDN/ML Based Network Security : A Survey

Authors: Tam N. Nguyen | Published: 2018-04-08 | Updated: 2018-04-14
SDN Security Solution
Model Extraction Attack
Anomaly Detection Method