Found: 587
Select item for more details and to access through your institution.
A Novel Lightweight NIDS Framework for Detecting Anomalous Data Traffic in Contemporary Networks.
- Published in:
- Journal of Circuits, Systems & Computers, 2024, v. 33, n. 13, p. 1, doi. 10.1142/S0218126624502281
- By:
- Publication type:
- Article
Data transmission optimization in edge computing using multi-objective reinforcement learning.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21179, doi. 10.1007/s11227-024-06213-7
- By:
- Publication type:
- Article
A Novel Approach to DDoS Detection in Multi-Controller SDNs: Adaptive Learning Models and Real-Time Feedback for Enhanced IoT Security.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 5, p. 570, doi. 10.22266/ijies2024.1031.44
- By:
- Publication type:
- Article
Internet Traffic Classification Model Based on A-DBSCAN Algorithm.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 5, p. 966, doi. 10.22266/ijies2024.1031.72
- By:
- Publication type:
- Article
An intelligent load balancing algorithm for 5G‐satellite networks.
- Published in:
- International Journal of Satellite Communications & Networking, 2024, v. 42, n. 5, p. 329, doi. 10.1002/sat.1517
- By:
- Publication type:
- Article
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 18325, doi. 10.1007/s11227-024-06153-2
- By:
- Publication type:
- Article
ICLB: intelligent controllers load balancing for software-defined based optical data center networks.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 13, p. 19031, doi. 10.1007/s11227-024-06165-y
- By:
- Publication type:
- Article
RECURRENT NEURAL NETWORK BASED INCREMENTAL MODEL FOR INTRUSION DETECTION SYSTEM IN IOT.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3778, doi. 10.12694/scpe.v25i5.3004
- By:
- Publication type:
- Article
OPTIMIZATION OF COMPUTER NETWORK SECURITY SYSTEM BASED ON IMPROVED NEURAL NETWORK ALGORITHM AND DATA SEARCHING.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3979, doi. 10.12694/scpe.v25i5.3150
- By:
- Publication type:
- Article
FlexpushdownDB: rethinking computation pushdown for cloud OLAP DBMSs.
- Published in:
- VLDB Journal International Journal on Very Large Data Bases, 2024, v. 33, n. 5, p. 1643, doi. 10.1007/s00778-024-00867-8
- By:
- Publication type:
- Article
Federated learning for network attack detection using attention-based graph neural networks.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70032-2
- By:
- Publication type:
- Article
LPCE-Based Replacement Scheme for Enhancing Caching Performance in Named Data Networking.
- Published in:
- International Journal of Interactive Mobile Technologies, 2024, v. 18, n. 16, p. 119, doi. 10.3991/ijim.v18i16.49185
- By:
- Publication type:
- Article
Energy-Efficient and Congestion-Thermal Aware Routing Protocol for WBAN.
- Published in:
- Wireless Personal Communications, 2024, v. 137, n. 4, p. 2167, doi. 10.1007/s11277-024-11481-w
- By:
- Publication type:
- Article
An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm.
- Published in:
- Wireless Personal Communications, 2024, v. 137, n. 4, p. 2409, doi. 10.1007/s11277-024-11505-5
- By:
- Publication type:
- Article
Resource allocation problem and artificial intelligence: the state-of-the-art review (2009–2023) and open research challenges.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 26, p. 67953, doi. 10.1007/s11042-024-18123-0
- By:
- Publication type:
- Article
Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6.
- Published in:
- PLoS ONE, 2024, v. 19, n. 8, p. 1, doi. 10.1371/journal.pone.0306132
- By:
- Publication type:
- Article
Conjointly active and passive modelings with deep neural networks as fully automated optimizations for upper-mid band 6G communications.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-68011-8
- By:
- Publication type:
- Article
Classification of DDoS attack traffic on SDN network environment using deep learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00219-7
- By:
- Publication type:
- Article
MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review.
- Published in:
- Computing, 2024, v. 106, n. 8, p. 2785, doi. 10.1007/s00607-024-01307-9
- By:
- Publication type:
- Article
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification.
- Published in:
- Computing, 2024, v. 106, n. 8, p. 2875, doi. 10.1007/s00607-024-01306-w
- By:
- Publication type:
- Article
SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 15, p. 2953, doi. 10.3390/electronics13152953
- By:
- Publication type:
- Article
Deep Reinforcement Learning-Based Multipath Routing for LEO Megaconstellation Networks.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 15, p. 3054, doi. 10.3390/electronics13153054
- By:
- Publication type:
- Article
Network Intrusion Detection using Combined Deep Learning Models: Literature Survey and Future Research Directions.
- Published in:
- IAENG International Journal of Computer Science, 2024, v. 51, n. 8, p. 998
- By:
- Publication type:
- Article
Subnetwork Based Traffic Aware Rerouting for CMesh Bufferless Network-on-Chip.
- Published in:
- Journal of Circuits, Systems & Computers, 2024, v. 33, n. 12, p. 1, doi. 10.1142/S0218126624502074
- By:
- Publication type:
- Article
Energy consumption of data transfer: Intensity indicators versus absolute estimates.
- Published in:
- Journal of Industrial Ecology, 2024, v. 28, n. 4, p. 996, doi. 10.1111/jiec.13513
- By:
- Publication type:
- Article
An Ensemble Boosting Algorithm based Intrusion Detection System for Smart Internet of Things Environment.
- Published in:
- Journal of Intelligent Systems & Internet of Things, 2024, v. 13, n. 2, p. 272, doi. 10.54216/JISIoT.130222
- By:
- Publication type:
- Article
Unveiling Malicious Network Flows Using Benford's Law.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 15, p. 2299, doi. 10.3390/math12152299
- By:
- Publication type:
- Article
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 15, p. 5022, doi. 10.3390/s24155022
- By:
- Publication type:
- Article
Blocking harmful images with a deep learning based next generation firewall.
- Published in:
- Sigma: Journal of Engineering & Natural Sciences / Mühendislik ve Fen Bilimleri Dergisi, 2024, v. 42, n. 4, p. 1133, doi. 10.14744/sigma.2024.00093
- By:
- Publication type:
- Article
Enhancing data protection with a distributed storage system based on the redundant residue number system.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5601, doi. 10.1007/s11276-023-03287-8
- By:
- Publication type:
- Article
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 6177, doi. 10.1007/s11276-023-03414-5
- By:
- Publication type:
- Article
Overcoming laser phase noise for low-cost coherent optical communication.
- Published in:
- Nature Communications, 2024, v. 15, n. 1, p. 1, doi. 10.1038/s41467-024-50439-1
- By:
- Publication type:
- Article
Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-68342-6
- By:
- Publication type:
- Article
An optimized intrusion detection model for wireless sensor networks based on MLP-CatBoost algorithm.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 25, p. 66725, doi. 10.1007/s11042-023-18034-6
- By:
- Publication type:
- Article
A Deep Learning-Based Intrusion Detection Model Integrating Convolutional Neural Network and Vision Transformer for Network Traffic Attack in the Internet of Things.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2685, doi. 10.3390/electronics13142685
- By:
- Publication type:
- Article
Clustering Network Traffic Using Semi-Supervised Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2769, doi. 10.3390/electronics13142769
- By:
- Publication type:
- Article
An Architecture of Enhanced Profiling Assurance for IoT Networks.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2832, doi. 10.3390/electronics13142832
- By:
- Publication type:
- Article
Encrypted Traffic Decryption Tools: Comparative Performance Analysis and Improvement Guidelines.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2876, doi. 10.3390/electronics13142876
- By:
- Publication type:
- Article
Anomaly detection in network traffic with ELSC learning algorithm.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2024, v. 60, n. 14, p. 1, doi. 10.1049/ell2.13235
- By:
- Publication type:
- Article
Enhancing network intrusion detection by lifelong active online learning.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 11, p. 16428, doi. 10.1007/s11227-024-06070-4
- By:
- Publication type:
- Article
Reading between the Lines: Process Mining on OPC UA Network Data.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 14, p. 4497, doi. 10.3390/s24144497
- By:
- Publication type:
- Article
Using Machine Learning Multiclass Classification Technique to Detect IoT Attacks in Real Time.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 14, p. 4516, doi. 10.3390/s24144516
- By:
- Publication type:
- Article
Investigating the effect of dynamic traffic distribution on network-wide traffic emissions: An empirical study in Ningbo, China.
- Published in:
- PLoS ONE, 2024, v. 19, n. 7, p. 1, doi. 10.1371/journal.pone.0305481
- By:
- Publication type:
- Article
NoC simulation steered by NEST: McAERsim and a Noxim patch.
- Published in:
- Frontiers in Neuroscience, 2024, p. 1, doi. 10.3389/fnins.2024.1371103
- By:
- Publication type:
- Article
Editorial for Special Issue "Advancements in Wireless Communications, Networks, and Signal Processing".
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 13, p. 5725, doi. 10.3390/app14135725
- By:
- Publication type:
- Article
A Systematic and Comprehensive Study on Machine Learning and Deep Learning Models in Web Traffic Prediction.
- Published in:
- Archives of Computational Methods in Engineering, 2024, v. 31, n. 5, p. 3171, doi. 10.1007/s11831-024-10077-8
- By:
- Publication type:
- Article
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network.
- Published in:
- Computers, Materials & Continua, 2024, v. 80, n. 1, p. 819, doi. 10.32604/cmc.2024.050474
- By:
- Publication type:
- Article
MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection.
- Published in:
- Computers, Materials & Continua, 2024, v. 80, n. 1, p. 875, doi. 10.32604/cmc.2024.051685
- By:
- Publication type:
- Article
Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 13, p. 2462, doi. 10.3390/electronics13132462
- By:
- Publication type:
- Article
Utilizing TabNet Deep Learning for Elephant Flow Detection by Analyzing Information in First Packet Headers.
- Published in:
- Entropy, 2024, v. 26, n. 7, p. 537, doi. 10.3390/e26070537
- By:
- Publication type:
- Article