Advances, Systems and Applications
From: Deep learning approach to security enforcement in cloud workflow orchestration
Anomaly Types
Anomaly Detection Technique
System Data Collection
Real-time Anomaly Detection
Workflow Orchestration
Papers
Data Security
Behavior
Intrusion Detection
ML
Neural Networks
Policy-based
[35, 36]
✓
[34]
[37, 26]
[28]
[29, 25]
[30]
[31]
Our System