Intrusion detection
Graph-based intrusion detection in IoT systems.
This research explores the use of graph-based trace (e.g. provenance data) and machine learning techniques for the detection of malicous interactions in IoT enviroments.
This research explores the use of graph-based trace (e.g. provenance data) and machine learning techniques for the detection of malicous interactions in IoT enviroments.