309
edits
Line 68: | Line 68: | ||
**'''Deep Learning For Anomaly Detection''' | **'''Deep Learning For Anomaly Detection''' | ||
***Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D Nguyen, Thorsten Ries, Mohamed Ourdane, [https://ieeexplore.ieee.org/abstract/document/8406295 Detecting malicious authentication events trustfully], IEEE IFIP 2018. ('''Presented by Rezai, Masoud''') | ***Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D Nguyen, Thorsten Ries, Mohamed Ourdane, [https://ieeexplore.ieee.org/abstract/document/8406295 Detecting malicious authentication events trustfully], IEEE IFIP 2018. ('''Presented by Rezai, Masoud''') | ||
***('''Presented by Yuhan Wang''') | ***Subhendu Khatuya, Niloy Ganguly, Jayanta Basak, Madhumita Bharde, Bivas Mitra, [https://ieeexplore.ieee.org/abstract/document/8486257 ADELE: Anomaly Detection from Event Log Empiricism], IEEE Infocomm 2018. ('''Presented by Yuhan Wang''') | ||