Web: http://arxiv.org/abs/2301.09801

Jan. 25, 2023, 2:10 a.m. | Jiashu Wu, Hao Dai, Yang Wang, Kejiang Ye, Chengzhong Xu

cs.CR updates on arXiv.org arxiv.org

Data scarcity hinders the usability of data-dependent algorithms when
tackling IoT intrusion detection (IID). To address this, we utilise the data
rich network intrusion detection (NID) domain to facilitate more accurate
intrusion detection for IID domains. In this paper, a Geometric Graph Alignment
(GGA) approach is leveraged to mask the geometric heterogeneities between
domains for better intrusion knowledge transfer. Specifically, each intrusion
domain is formulated as a graph where vertices and edges represent intrusion
categories and category-wise interrelationships, respectively. The …

detection domain intrusion intrusion detection iot

Chief Information Security Officer

@ Los Angeles Unified School District | Los Angeles

Cybersecurity Engineer

@ Apercen Partners LLC | Folsom, CA

IDM Sr. Security Developer

@ The Ohio State University | Columbus, OH, United States

IT Security Engineer

@ Stylitics | New York City

Information Security Engineer

@ VDA Labs | Remote

Enterprise Security Engineer

@ Greenlight | Bengaluru, Karnataka

Security Solution Administrator - Antivirus Operation (REF565Y)

@ Deutsche Telekom IT Solutions | Budapest, Pécs, Debrecen, Szeged, Hungary

IT Infrastructure Engineer - Cloud Security Administration and Consulting

@ Bosch Group | Warszawa, Poland

Embedded Software Development und Cyber Security Experte (m/w/div)

@ Bosch Group | Leinfelden-Echterdingen, Germany

Senior Cybersecurity Architect

@ McDonald's Corporation | Chicago, IL, United States

Security Engineering Student Worker

@ Mozilla | Remote

Cybersecurity Masters Intern

@ Visa | Ashburn, VA, United States