Abnormal Client Behavior Detection in Federated Learning Authors: Suyi Li, Yong Cheng, Yang Liu, Wei Wang, Tianjian Chen | Published: 2019-10-22 | Updated: 2019-12-06 Client Contribution AssessmentPoisoningAnomaly Detection Method 2019.10.22 2025.05.28 Literature Database
Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert | Published: 2019-07-27 | Updated: 2019-09-03 Q-learning AlgorithmTaxonomy of AttacksAnomaly Detection Method 2019.07.27 2025.05.28 Literature Database
System Misuse Detection via Informed Behavior Clustering and Modeling Authors: Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp | Published: 2019-07-01 Data Extraction and AnalysisMachine Learning FrameworkAnomaly Detection Method 2019.07.01 2025.05.28 Literature Database
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten | Published: 2018-09-20 IoT SecurityIoT Traffic CharacteristicsAnomaly Detection Method 2018.09.20 2025.05.28 Literature Database
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07 Malware Detection MethodInformation SecurityAnomaly Detection Method 2017.10.13 2025.05.28 Literature Database
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack Authors: Arash Rahnama, Panos J. Antsaklis | Published: 2017-09-28 Byzantine Consensus MechanismConvergence analysisAnomaly Detection Method 2017.09.28 2025.05.28 Literature Database
Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26 Model Performance EvaluationAttacker Behavior AnalysisAnomaly Detection Method 2017.09.26 2025.05.28 Literature Database
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.28 Literature Database