INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue XI, November 2025
www.ijltemas.in Page 336
REFERENCES
1. Barsha, N. K., & Hubballi, N. (2024). Anomaly detection in SCADA systems: A state transition
modeling approach. IEEE Transactions on Network and Service Management, 21(3), 425–440.
https://doi.org/10.1109/TNSM.2024.3280110
2. Chen, H., Zhao, W., Zhang, X., & Zhou, Q. (2024). Graph neural network–based robust anomaly
detection in SDN microservice systems. Computer Networks, 239, 110135.
https://doi.org/10.1016/j.comnet.2024.110135
3. Fang, Y. (2024). APIB-GAN: A GAN-based approach for internet-behavior anomaly prediction. Physical
Communication, 66, 102040. https://doi.org/10.1016/j.phycom.2024.102040
4. Grubov, V. V., Nechaev, D., & Kotov, V. (2024). Two-stage outlier detection enhancing automatic
seizure detection. IEEE Access, 12, 22541–22556. https://doi.org/10.1109/ACCESS.2024.3389511
5. ITU-T. (2024). Y.3057: Artificial intelligence–enabled network security framework. International
Telecommunication Union. https://www.itu.int/rec/T-REC-Y.3057-2024
6. ISO/IEC. (2024). 27090: Adaptive security analytics guidelines. International Organization for
Standardization. https://www.iso.org/standard/88357.html
7. Lamichhane, P. B., & Eberle, W. (2024). Anomaly detection in graph-structured data: A survey. arXiv
preprint, arXiv:2405.06172.
8. Li, B., Wang, Y., & Cheng, L. (2024). Adaptive and augmented active anomaly detection on dynamic
network traffic streams. Frontiers of Information Technology & Electronic Engineering, 25(4), 512–525.
https://doi.org/10.1631/FITEE.2400260
9. Lin, L., Han, Z., & Yu, J. (2024). Integrating adversarial training into deep autoencoders for anomaly
detection. Engineering Applications of Artificial Intelligence, 136, 108856.
https://doi.org/10.1016/j.engappai.2024.108856
10. Macková, K., Benk, D., & Šrotýr, M. (2024). Enhancing cybersecurity through comparative analysis of
deep-learning models for anomaly detection. In Proceedings of the 2024 International Conference on
Information Systems Security and Privacy (ICISSP) (pp. 421–435). Springer.
11. Mounnan, M., Akhtar, N., & Kawsar, F. (2024). Hybrid learning frameworks for adaptive network
anomaly detection. Sensors, 24(9), 3385. https://doi.org/10.3390/s24093385
12. Taghikhah, M., Verma, S., & Zhong, L. (2024). Quantile-based maximum likelihood training for outlier
detection. In Proceedings of the 38th AAAI Conference on Artificial Intelligence (pp. 4821–4829).
AAAI Press.
13. Wang, H., & Zhong, Z. (2024). Improved Gaussian mixture modeling for network traffic anomaly
detection. Computers & Security, 137, 103657. https://doi.org/10.1016/j.cose.2024.103657
14. Williams, R., Chen, P., & Dubé, A. (2024). Entropy and threshold-based anomaly detection in dynamic
cloud environments. Journal of Network and Computer Applications, 245, 103771.
https://doi.org/10.1016/j.jnca.2024.103771
15. Wurzenberger, M., Müller, J., & Lipp, J. (2024). Statistical properties of log data for advanced anomaly
detection. Computers & Security, 137, 103631. https://doi.org/10.1016/j.cose.2024.103631
16. Zhang, Y., & Lázaro, L. (2024). Traffic-based anomaly detection under adversarial perturbation. IEEE
Transactions on Information Forensics and Security, 19(6), 3152–3167.
https://doi.org/10.1109/TIFS.2024.3367019
17. Zhou, X., Chen, X., & Li, D. (2024). Reconstructed graph neural network with knowledge distillation for
lightweight anomaly detection. IEEE Transactions on Neural Networks and Learning Systems, 35(4),
5650–5664. https://doi.org/10.1109/TNNLS.2024.3332011