Found: 479
Select item for more details and to access through your institution.
Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms.
- Published in:
- Expert Systems, 2024, v. 41, n. 7, p. 1, doi. 10.1111/exsy.13546
- By:
- Publication type:
- Article
An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 10, p. 13557, doi. 10.1007/s11227-024-05993-2
- By:
- Publication type:
- Article
MERPAL: multicollinearity regressive multilayer perceptron-based traffic-aware scheme for IoT-enabled smart cities.
- Published in:
- Neural Computing & Applications, 2024, v. 36, n. 19, p. 11297, doi. 10.1007/s00521-024-09652-8
- By:
- Publication type:
- Article
A novel approach for APT attack detection based on feature intelligent extraction and representation learning.
- Published in:
- PLoS ONE, 2024, v. 19, n. 6, p. 1, doi. 10.1371/journal.pone.0305618
- By:
- Publication type:
- Article
RaSTFormer: region-aware spatiotemporal transformer for visual homogenization recognition in short videos.
- Published in:
- Neural Computing & Applications, 2024, v. 36, n. 18, p. 10713, doi. 10.1007/s00521-024-09633-x
- By:
- Publication type:
- Article
ITC-Net-blend-60: a comprehensive dataset for robust network traffic classification in diverse environments.
- Published in:
- BMC Research Notes, 2024, v. 17, n. 1, p. 1, doi. 10.1186/s13104-024-06817-5
- By:
- Publication type:
- Article
Adversarial attack defense algorithm based on convolutional neural network.
- Published in:
- Neural Computing & Applications, 2024, v. 36, n. 17, p. 9723, doi. 10.1007/s00521-023-09045-3
- By:
- Publication type:
- Article
A Comprehensive Architecture for Federated Learning-Based Smart Advertising.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 12, p. 3765, doi. 10.3390/s24123765
- By:
- Publication type:
- Article
Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4421, doi. 10.3390/app14114421
- By:
- Publication type:
- Article
Research on the Fiber-to-the-Room Network Traffic Prediction Method Based on Crested Porcupine Optimizer Optimization.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4840, doi. 10.3390/app14114840
- By:
- Publication type:
- Article
CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units.
- Published in:
- Complex & Intelligent Systems, 2024, v. 10, n. 3, p. 3353, doi. 10.1007/s40747-023-01313-y
- By:
- Publication type:
- Article
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00201-9
- By:
- Publication type:
- Article
Neighbor discovery protocol anomaly-based detection system using neural network algorithm.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 1787, doi. 10.1007/s10207-024-00815-1
- By:
- Publication type:
- Article
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 2457, doi. 10.1007/s10207-023-00792-x
- By:
- Publication type:
- Article
An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2024, v. 20, n. 1, p. 16, doi. 10.37917/ijeee.20.1.2
- By:
- Publication type:
- Article
Security Analysis for Smart Healthcare Systems.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 11, p. 3375, doi. 10.3390/s24113375
- By:
- Publication type:
- Article
Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 11, p. 3509, doi. 10.3390/s24113509
- By:
- Publication type:
- Article
Efficient Data Management in Agricultural IoT: Compression, Security, and MQTT Protocol Analysis.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 11, p. 3517, doi. 10.3390/s24113517
- By:
- Publication type:
- Article
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00169-0
- By:
- Publication type:
- Article
A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm.
- Published in:
- PLoS ONE, 2024, v. 19, n. 5, p. 1, doi. 10.1371/journal.pone.0302294
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2024
- By:
- Publication type:
- Editorial
Enhancing Botnet Detection in Network Security Using Profile Hidden Markov Models.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 10, p. 4019, doi. 10.3390/app14104019
- By:
- Publication type:
- Article
Energy-Efficient Virtual Network Embedding: A Deep Reinforcement Learning Approach Based on Graph Convolutional Networks.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 10, p. 1918, doi. 10.3390/electronics13101918
- By:
- Publication type:
- Article
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10223, doi. 10.1007/s11227-023-05809-9
- By:
- Publication type:
- Article
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10444, doi. 10.1007/s11227-023-05833-9
- By:
- Publication type:
- Article
IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 10, p. 3218, doi. 10.3390/s24103218
- By:
- Publication type:
- Article
Blockchain-based 6G task offloading and cooperative computing resource allocation study.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-024-00655-3
- By:
- Publication type:
- Article
An adversarial environment reinforcement learning-driven intrusion detection algorithm for Internet of Things.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13638-024-02348-6
- By:
- Publication type:
- Article
Comparative Analysis of Classification Methods and Suitable Datasets for Protocol Recognition in Operational Technologies.
- Published in:
- Algorithms, 2024, v. 17, n. 5, p. 208, doi. 10.3390/a17050208
- By:
- Publication type:
- Article
Fusion of Spiral Convolution-LSTM for Intrusion Detection Modeling.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 2, p. 2315, doi. 10.32604/cmc.2024.048443
- By:
- Publication type:
- Article
Categorical learning for automated network traffic categorization for future generation networks in SDN.
- Published in:
- Computing, 2024, v. 106, n. 5, p. 1451, doi. 10.1007/s00607-024-01277-y
- By:
- Publication type:
- Article
Ship Network Traffic Engineering Based on Reinforcement Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 9, p. 1710, doi. 10.3390/electronics13091710
- By:
- Publication type:
- Article
Intrusion detection system based on the beetle swarm optimization and K‐RMS clustering algorithm.
- Published in:
- International Journal of Adaptive Control & Signal Processing, 2024, v. 38, n. 5, p. 1675, doi. 10.1002/acs.3771
- By:
- Publication type:
- Article
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network.
- Published in:
- International Journal of Network Management, 2024, v. 34, n. 3, p. 1, doi. 10.1002/nem.2258
- By:
- Publication type:
- Article
Low-Cost Programmable Waveguide Attenuator.
- Published in:
- 2024
- Publication type:
- Product Review
A new method of network traffic prediction based on combination model.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 3, p. 1075, doi. 10.1007/s12083-024-01630-0
- By:
- Publication type:
- Article
SECURITY SITUATION AWARENESS SYSTEM BASED ON ARTIFICIAL INTELLIGENCE.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 3, p. 1301, doi. 10.12694/scpe.v25i3.2065
- By:
- Publication type:
- Article
Reducing DNS Traffic to Enhance Home IoT Device Privacy.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 9, p. 2690, doi. 10.3390/s24092690
- By:
- Publication type:
- Article
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 9, p. 2746, doi. 10.3390/s24092746
- By:
- Publication type:
- Article
The Attention-Based Autoencoder for Network Traffic Classification with Interpretable Feature Representation.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 5, p. 589, doi. 10.3390/sym16050589
- By:
- Publication type:
- Article
Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2477, doi. 10.1007/s11276-024-03680-x
- By:
- Publication type:
- Article
TITAN: Combining a bidirectional forwarding graph and GCN to detect saturation attack targeted at SDN.
- Published in:
- PLoS ONE, 2024, v. 19, n. 4, p. 1, doi. 10.1371/journal.pone.0299846
- By:
- Publication type:
- Article
Self-healing hybrid intrusion detection system: an ensemble machine learning approach.
- Published in:
- Discover Artificial Intelligence, 2024, v. 4, n. 1, p. 1, doi. 10.1007/s44163-024-00120-9
- By:
- Publication type:
- Article
Hidden Markov Model-Based Dynamic Hard Shoulders Running Strategy in Hybrid Network Environments.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 8, p. 3145, doi. 10.3390/app14083145
- By:
- Publication type:
- Article
Federated Learning with Pareto Optimality for Resource Efficiency and Fast Model Convergence in Mobile Environments †.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 8, p. 2476, doi. 10.3390/s24082476
- By:
- Publication type:
- Article
Flextory: Flexible Software Factory of IoT Data Consumers.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 8, p. 2550, doi. 10.3390/s24082550
- By:
- Publication type:
- Article
An Adaptive Cell Switch Off framework to Increase Energy Efficiency in Cellular Networks.
- Published in:
- Wireless Personal Communications, 2024, v. 135, n. 4, p. 2011, doi. 10.1007/s11277-024-11027-0
- By:
- Publication type:
- Article
B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows.
- Published in:
- Journal of Big Data, 2024, v. 11, n. 1, p. 1, doi. 10.1186/s40537-024-00900-1
- By:
- Publication type:
- Article
Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 7, p. 3073, doi. 10.3390/app14073073
- By:
- Publication type:
- Article
Machine learning based data collection protocol for intelligent transport systems: a real-time implementation on Dublin M50, Ireland.
- Published in:
- Complex & Intelligent Systems, 2024, v. 10, n. 2, p. 1879, doi. 10.1007/s40747-023-01241-x
- By:
- Publication type:
- Article