On the practicality of detecting anomalies with encrypted traffic in AMI.
Robin BerthierDavid I. UrbinaAlvaro A. CárdenasMichael GuerreroUlrich HerbergJorjeta G. JetchevaDaisuke MashimaJun Ho HuhRakesh B. BobbaPublished in: SmartGridComm (2014)
Keyphrases
- detecting anomalies
- anomaly detection
- network traffic
- ambient intelligence
- data mining applications
- intrusion detection
- stepping stones
- abnormal events
- software engineering
- intrusion detection system
- traffic flow
- network security
- advanced metering infrastructure
- artificial intelligence
- databases
- probabilistic model
- pairwise
- feature extraction
- ambient intelligent
- data sets