ProvIoT : Detecting Stealthy Attacks in IoT Through Federated Edge-Cloud Security.
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III(2024)
Key words
Provenance graph analysis,anomaly detection,dynamic malware analysis,federated learning,deep learning,privacy
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined