Graph anomaly detection with graph neural networks: Current status and challenges

H Kim, BS Lee, WY Shin, S Lim - IEEE Access, 2022 - ieeexplore.ieee.org
Graphs are used widely to model complex systems, and detecting anomalies in a graph is
an important task in the analysis of complex systems. Graph anomalies are patterns in a …

The ascent of network traffic classification in the dark net: A survey

A Jenefa, V Edward Naveen - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The Darknet is a section of the internet that is encrypted and untraceable, making it a
popular location for illicit and illegal activities. However, the anonymity and encryption …

Motif-backdoor: Rethinking the backdoor attack on graph neural networks via motifs

H Zheng, H Xiong, J Chen, H Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Graph neural network (GNN) with a powerful representation capability has been widely
applied to various areas. Recent works have exposed that GNN is vulnerable to the …

[HTML][HTML] ProvNet-IoT: Provenance based network layer forensics in Internet of Things

L Sadineni, ES Pilli, RB Battula - Forensic Science International: Digital …, 2022 - Elsevier
Internet of Things is rapidly changing the human lives to bring convenience in domestic,
public and industrial environments spanning across multiple application domains. At the …

A network traffic prediction model based on reinforced staged feature interaction and fusion

Y Lu, Q Ning, L Huang, B Chen - Computer Networks, 2023 - Elsevier
With the increasingly intelligent services provided by the Internet, users' requirements are
further improved in communication quality. Real-time and accurate prediction of network …

Unsupervised clustering of bitcoin transactions

G Vlahavas, K Karasavvas, A Vakali - Financial Innovation, 2024 - Springer
Since its inception in 2009, Bitcoin has become and is currently the most successful and
widely used cryptocurrency. It introduced blockchain technology, which allows transactions …

[图书][B] Multi-fractal traffic and anomaly detection in computer communications

M Li - 2022 - taylorfrancis.com
This book provides a comprehensive theory of mono-and multi-fractal traffic, including the
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …

Graph representation learning for context-aware network intrusion detection

A Premkumar, M Schneider, C Spivey… - … Learning for Multi …, 2023 - spiedigitallibrary.org
Detecting malicious activity using a network intrusion detection system (NIDS) is an ongoing
battle for the cyber defender. Increasingly, cyber-attacks are sophisticated and occur rapidly …

A Survey on Consumer IoT Traffic: Security and Privacy

Y Jia, Y Song, Z Liu, Q Tan, F Wang, Y Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
For the past few years, the Consumer Internet of Things (CIoT) has entered public lives.
While CIoT has improved the convenience of people's daily lives, it has also brought new …

Unsupervised Anomaly Detection Approach for Cyberattack Identification

L Segurola-Gil, M Moreno-Moreno, I Irigoien… - International Journal of …, 2024 - Springer
With the increasing amount of devices connected to the huge net known as the internet, it is
not surprising the corresponding growth of cyber attacks. The era of the Internet of Things …