Found: 621
Select item for more details and to access through your institution.
Bootstrap and MRCD Estimators in Hotelling's T 2 Control Charts for Precise Intrusion Detection.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 17, p. 7948, doi. 10.3390/app14177948
- By:
- Publication type:
- Article
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 5, p. 3329, doi. 10.1007/s10207-024-00891-3
- By:
- Publication type:
- Article
PRELIMINARY ORGANIZATION OF VIRTUAL NETWORK BASED ON PROGRAM MONITORING.
- Published in:
- International Journal on Information Technologies & Security, 2024, v. 16, n. 3, p. 111
- By:
- Publication type:
- Article
Trustworthy-Based Authentication Model with Intrusion Detection for IoT-Enabled Networks with Deep Learning Algorithm.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 198, doi. 10.54216/JCIM.140214
- By:
- Publication type:
- Article
Optimizing intrusion detection in 5G networks using dimensionality reduction techniques.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5652, doi. 10.11591/ijece.v14i5.pp5652-5671
- By:
- Publication type:
- Article
Modelling an Improved Swarm Optimizer and Boosted Quantile Estimator For Malicious Flow Monitoring And Prediction In Network.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 124, doi. 10.54216/JCIM.130210
- By:
- Publication type:
- Article
Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 96, doi. 10.54216/JCIM.130208
- By:
- Publication type:
- Article
Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 19, doi. 10.54216/JCIM.130202
- By:
- Publication type:
- Article
A deep learning based approach for image retrieval extraction in mobile edge computing.
- Published in:
- Umm Al-Qura University Journal of Engineering & Architecture (Springer Nature), 2024, v. 15, n. 3, p. 318, doi. 10.1007/s43995-024-00060-6
- By:
- Publication type:
- Article
THE EFFECT OF NOISE ON RECURRENT DIAGRAMS OF ENERGY CONSUMPTION OF A METALLURGICAL ENTERPRISE.
- Published in:
- Technology Audit & Production Reserves, 2024, v. 4, n. 1(78), p. 11, doi. 10.15587/2706-5448.2024.309790
- By:
- Publication type:
- Article
An Overview Based on the Overall Architecture of Traffic Forecasting.
- Published in:
- Data Science & Engineering, 2024, v. 9, n. 3, p. 341, doi. 10.1007/s41019-024-00246-x
- By:
- Publication type:
- Article
Enhancing Mobile Ad Hoc Network Security: An Anomaly Detection Approach Using Support Vector Machine for Black-Hole Attack Detection.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 4, p. 1015, doi. 10.18280/ijsse.140401
- By:
- Publication type:
- Article
A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 4, p. 1073, doi. 10.18280/ijsse.140406
- By:
- Publication type:
- Article
Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems.
- Published in:
- Journal of Intelligent Information Systems, 2024, v. 62, n. 4, p. 925, doi. 10.1007/s10844-023-00819-8
- By:
- Publication type:
- Article
Extraction of Minimal Set of Traffic Features Using Ensemble of Classifiers and Rank Aggregation for Network Intrusion Detection Systems.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 16, p. 6995, doi. 10.3390/app14166995
- By:
- Publication type:
- Article
Comparative Analysis of Deep Convolutional Neural Network—Bidirectional Long Short-Term Memory and Machine Learning Methods in Intrusion Detection Systems.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 16, p. 6967, doi. 10.3390/app14166967
- By:
- Publication type:
- Article
Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization.
- Published in:
- International Journal for Computers & Their Applications, 2024, v. 31, n. 2, p. 103
- By:
- Publication type:
- Article
An Innovative Recompression Scheme for VQ Index Tables.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 297, doi. 10.3390/fi16080297
- By:
- Publication type:
- Article
Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 284, doi. 10.3390/fi16080284
- By:
- Publication type:
- Article
A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network.
- Published in:
- Future Internet, 2024, v. 16, n. 8, p. 264, doi. 10.3390/fi16080264
- By:
- Publication type:
- Article
Software defined networking based network traffic classification using machine learning techniques.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- By:
- Publication type:
- Article
Enhancing Wireless Network Efficiency with the Techniques of Dynamic Distributed Load Balancing: A Distance-Based Approach.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5406, doi. 10.3390/s24165406
- By:
- Publication type:
- Article
A Survey on IoT Application Architectures.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5320, doi. 10.3390/s24165320
- By:
- Publication type:
- Article
Explainable Deep Learning-Based Feature Selection and Intrusion Detection Method on the Internet of Things.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5223, doi. 10.3390/s24165223
- By:
- Publication type:
- Article
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 8, p. 122, doi. 10.3390/technologies12080122
- By:
- Publication type:
- Article
Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3318, doi. 10.3390/electronics13163318
- By:
- Publication type:
- Article
Explore Utilizing Network Traffic Distribution to Detect Stepping-Stone Intrusion.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3258, doi. 10.3390/electronics13163258
- By:
- Publication type:
- Article
Performance Analysis of UAV-IRS Relay Multi-Hop FSO/THz Link.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3247, doi. 10.3390/electronics13163247
- By:
- Publication type:
- Article
WVETT-Net: A Novel Hybrid Prediction Model for Wireless Network Traffic Based on Variational Mode Decomposition.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3109, doi. 10.3390/electronics13163109
- By:
- Publication type:
- Article
Optimizing QoS Metrics for Software-Defined Networking in Federated Learning.
- Published in:
- Mobile Information Systems, 2023, p. 1, doi. 10.1155/2023/3896267
- By:
- Publication type:
- Article
Stealthy attack detection in multi-channel multi-radio wireless networks.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18503, doi. 10.1007/s11042-018-5866-z
- By:
- Publication type:
- Article
Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 16, p. 24689, doi. 10.1007/s11227-024-06371-8
- By:
- Publication type:
- Article
A network intrusion detection system based on deep learning in the IoT.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 16, p. 24520, doi. 10.1007/s11227-024-06345-w
- By:
- Publication type:
- Article
Data transmission optimization in edge computing using multi-objective reinforcement learning.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21179, doi. 10.1007/s11227-024-06213-7
- By:
- Publication type:
- Article
ICLB: intelligent controllers load balancing for software-defined based optical data center networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 19031, doi. 10.1007/s11227-024-06165-y
- By:
- Publication type:
- Article
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 18325, doi. 10.1007/s11227-024-06153-2
- By:
- Publication type:
- Article
Enhancing network intrusion detection by lifelong active online learning.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 16428, doi. 10.1007/s11227-024-06070-4
- By:
- Publication type:
- Article
An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 13557, doi. 10.1007/s11227-024-05993-2
- By:
- Publication type:
- Article
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10444, doi. 10.1007/s11227-023-05833-9
- By:
- Publication type:
- Article
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10223, doi. 10.1007/s11227-023-05809-9
- By:
- Publication type:
- Article
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 5, p. 6746, doi. 10.1007/s11227-023-05715-0
- By:
- Publication type:
- Article
Congestion control-based sink MOBility pattern for data gathering optimization in WSN.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 3, p. 3441, doi. 10.1007/s11227-023-05596-3
- By:
- Publication type:
- Article
Scalable short-entry dual-grain coherence directories with flexible region granularity.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2889, doi. 10.1007/s11227-023-05559-8
- By:
- Publication type:
- Article
iPartition: a distributed partitioning algorithm for block-centric graph processing systems.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 21116, doi. 10.1007/s11227-023-05492-w
- By:
- Publication type:
- Article
Switching algorithm in listen-and-talk-based MAC protocols for full-duplex cognitive radio networks with type 2 fuzzy cooperative spectrum sensing.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 21235, doi. 10.1007/s11227-023-05477-9
- By:
- Publication type:
- Article
A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20445, doi. 10.1007/s11227-023-05474-y
- By:
- Publication type:
- Article
A QoE-driven SDN traffic management for IoT-enabled surveillance systems using deep learning based on edge cloud computing.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 17, p. 19168, doi. 10.1007/s11227-023-05412-y
- By:
- Publication type:
- Article
Distributed composition of complex event services in IoT network.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 6, p. 6123, doi. 10.1007/s11227-020-03498-2
- By:
- Publication type:
- Article
CHESDA: continuous hybrid and energy-efficient secure data aggregation for WSN.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 5, p. 5045, doi. 10.1007/s11227-020-03455-z
- By:
- Publication type:
- Article
Contrastive learning for traffic flow forecasting based on multi graph convolution network.
- Published in:
- IET Intelligent Transport Systems (Wiley-Blackwell), 2024, v. 18, n. 2, p. 290, doi. 10.1049/itr2.12451
- By:
- Publication type:
- Article