Abstract: This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet of Things (IoT) systems. In our approach, artificial intelligence (AI)-driven ...
Abstract: Provenance graphs are structured audit logs that describe the history of a system’s execution. Recent studies have explored a variety of techniques to analyze provenance graphs for automated ...