Research Article

Detecting Anomalous LAN Activities under Differential Privacy

Figure 1

System model considered in this work.