no code implementations • 27 Jun 2022 • Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong
Outsourcing anomaly detection to third-parties can allow data owners to overcome resource constraints (e. g., in lightweight IoT devices), facilitate collaborative analysis (e. g., under distributed or multi-party scenarios), and benefit from lower costs and specialized expertise (e. g., of Managed Security Service Providers).