Advanced Topics in Computer Networks (ATCN) 2019: Difference between revisions

Line 68: Line 68:
**'''Deep Learning For Anomaly Detection'''
**'''Deep Learning For Anomaly Detection'''
***Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D Nguyen, Thorsten Ries, Mohamed Ourdane, [https://ieeexplore.ieee.org/abstract/document/8406295 Detecting malicious authentication events trustfully], IEEE IFIP 2018.  ('''Presented by Rezai, Masoud''')  
***Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D Nguyen, Thorsten Ries, Mohamed Ourdane, [https://ieeexplore.ieee.org/abstract/document/8406295 Detecting malicious authentication events trustfully], IEEE IFIP 2018.  ('''Presented by Rezai, Masoud''')  
***('''Presented by Yuhan Wang''')
***Subhendu Khatuya, Niloy Ganguly, Jayanta Basak, Madhumita Bharde, Bivas Mitra, [https://ieeexplore.ieee.org/abstract/document/8486257 ADELE: Anomaly Detection from Event Log Empiricism], IEEE Infocomm 2018. ('''Presented by Yuhan Wang''')