“…We therefore provide a complete list of their subclusters, emphasizing the methods used. ANOMALY DETECTION (339 docs, 14 subclusters); Intrusion Detection (72), Time Series Data (72), Outlier Detection (51), Long Short-term Memory (45), Support Vector Machine (38), Log Anomaly Detection (32), Random Forest (29), Anomalous Behavior (30), Data Mining (29), Cyber-physical System (23), Video Surveillance (18), Industry 4.0 (19), Attention Mechanism (17), Fraud Detection (16) NEURAL NETWORK (373 docs, 14 subclusters); Detection System (143), Convolution Neural Network (105), Long Short-term Memory (73), Recurrent Neural Network (67), Artificial Neural Network (57), Support Vector Machine (38), Random Forest (37), Attention Mechanism (23), Graph Neural Network (23), Computer Vision (21), Generative Adversarial Network (18), Adversarial Attack (10), Activity Recognition (10), Fraud Detection (5).…”