Nowadays, there is a huge and growing concern about security in information and communication technology among the scientific community because any attack or anomaly …
P An, Z Wang, C Zhang - Information Processing & Management, 2022 - Elsevier
Previous studies have adopted unsupervised machine learning with dimension reduction functions for cyberattack detection, which are limited to performing robust anomaly detection …
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
L Cui, Y Qu, L Gao, G Xie, S Yu - Journal of Network and Computer …, 2020 - Elsevier
The big data sources in smart grid (SG) enable utilities to monitor, control, and manage the energy system effectively, which is also promising to advance the efficiency, reliability, and …
Anomalies could be the threats to the network that have ever/never happened. To protect networks against malicious access is always challenging even though it has been studied …
Through the ongoing digitization of the world, the number of connected devices is continuously growing without any foreseen decline in the near future. In particular, these …
The digital revolution has substantially changed our lives in which Internet-of-Things (IoT) plays a prominent role. The rapid development of IoT to most corners of life, however, leads …
Abstract Space anomaly detection plays a critical role in safeguarding the integrity and reliability of space systems amid the rising tide of threats. This survey aims to deepen …
K Yang, Y Shi, Z Yu, Q Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the vigorous development of Industry 4.0, industrial Big Data has turned into the core element of the Industrial Internet of Things. As one of the most fundamental and …