Author:
Khan Muhammad Imran,Foley Simon N.,O'Sullivan Barry
Funder
European Regional Development Fund
Reference22 articles.
1. Improving data utility in differential privacy and k-anonymity;soria-comas;CoRR,2013
2. Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies
3. Detecting anomalous behavior in DBMS logs;khan;Risks and Security of Internet and Systems - 11th International Conference CRiSIS 2016,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of IoT Devices and Network Anomalies based on Anonymized Network Traffic;NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium;2023-05-08