| Algorithm 1: Fusion-based trust anomaly detection algorithm. |
|
Input:, , Output:, , , begin 1: detection system is ready 2: return 3: for n = 1: length() 4: 5: 6: if then 7: be considered normal 8: else 9: is added to 10: end for 11: foreach T in 12: if 13: anomaly source is in communication layer 14: elseif 15: anomaly source is in transaction layer 16: elseif 17: anomaly source is in both layers 18: return 19: end for 20: 21: return , end |