no code implementations • 5 Jul 2019 • Xueshuo Xie, Zhi Wang, Xuhang Xiao, Lei Yang, Shenwei Huang, Tao Li
In this paper, we use blockchain to prevent logs from being tampered with and propose a pvalue-guided anomaly detection approach.
Cryptography and Security