Risk-Based Illegal Information Flow Detection in the IIoT.
Argiro AnagnostopoulouIoannis MavridisDimitris GritzalisPublished in: SECRYPT (2023)
Keyphrases
- information flow
- flow analysis
- social networks
- information flows
- communication networks
- supply chain
- information security
- false positives
- detection algorithm
- detection method
- anomaly detection
- object detection
- risk assessment
- information diffusion
- decision making
- multi context systems
- data mining
- information systems
- information propagation
- flow graph