Enhancing Internet of Things Security and Efficiency: Anomaly Detection via Proof of Stake Blockchain Techniques.
Seyed Salar SefatiOctavian FratuAhmed Mohammed NorSimona HalungaPublished in: ICAIIC (2024)
Keyphrases
- anomaly detection
- intrusion detection
- computer security
- network security
- intrusion detection system
- network traffic
- malware detection
- network intrusion detection
- unsupervised anomaly detection
- detecting anomalies
- information security
- network anomaly detection
- detecting anomalous
- behavior analysis
- anomalous behavior
- one class support vector machines
- intrusion prevention
- unsupervised learning
- detect anomalies
- mobile devices
- pattern recognition
- image segmentation
- negative selection algorithm
- computer networks
- pairwise
- learning algorithm