Autoencoder-based ids for cloud and mobile devices
Along with the popularization of cloud computing and the increase in responsibilities of
mobile devices, there is a need for intrusion detection systems available for working in these …
mobile devices, there is a need for intrusion detection systems available for working in these …
Outlier detection for partially labeled categorical data based on conditional information entropy
Z Zhao, R Wang, D Huang, Z Li - International Journal of Approximate …, 2024 - Elsevier
Labeling a large amount of data is exceptionally costly and practically infeasible, and thus
available data may have missing labels. In this article, we investigate outlier detection for …
available data may have missing labels. In this article, we investigate outlier detection for …
Flow-based machine learning approach for slow HTTP distributed denial of service attack classification
N Muraleedharan, B Janet - International Journal of …, 2021 - inderscienceonline.com
Distributed denial of service (DDoS) attack is one of the common threats to the availability of
services on the internet. The DDoS attacks are evolved from volumetric attack to slow DDoS …
services on the internet. The DDoS attacks are evolved from volumetric attack to slow DDoS …
Anomaly detection for health assessment and prediction of diesel generator set
Y Liu, M Qiao, S Jia - Proceedings of the 4th International Conference on …, 2018 - dl.acm.org
Diesel generator set is widely used in a variety of fields including industry, agriculture and
daily life. In order to obtain the operation status information of generator set in time to …
daily life. In order to obtain the operation status information of generator set in time to …
[PDF][PDF] Transform Sequential Data to Image for Detecting Covert Timing Channel
X Huang, Y Chen, X Zhuang, Y Lin - International Journal of …, 2024 - ijns.jalaxy.com.tw
The network covert timing channel utilizes inter-packet delay to encode binary data to
achieve information leakage and other purposes. In recent years, Covert Timing Channels …
achieve information leakage and other purposes. In recent years, Covert Timing Channels …
Machine learning models for malicious traffic detection in IoT networks/IoT-23 dataset
CV Oha, FS Farouk, PP Patel, P Meka… - … Conference on Machine …, 2021 - Springer
Connected devices are penetrating markets with an unprecedented speed. Networks that
carry Internet of Things (IoT) traffic need highly adaptable tools for traffic analysis to detect …
carry Internet of Things (IoT) traffic need highly adaptable tools for traffic analysis to detect …
Multiclassification of DDoS attacks using machine and deep learning techniques
R Bhatia, R Sharma - International Journal of Security and …, 2024 - inderscienceonline.com
There are very few studies to detect different classes of DDoS attacks. Multiclassification
helps network administrators to study individual behaviour. In this study, 82 flow-based …
helps network administrators to study individual behaviour. In this study, 82 flow-based …
[图书][B] Security Framework for The Internet of Things Applications
The text highlights a comprehensive survey that focuses on all security aspects and
challenges facing the Internet of Things systems, including outsourcing techniques for partial …
challenges facing the Internet of Things systems, including outsourcing techniques for partial …
Investigating the Capability of Generative Adversarial Networks of Capturing Implicit Laws in Physical Systems
E Kohmann - 2023 - ntnuopen.ntnu.no
The challenge of interpreting generative models, particularly in the context of Generative
Adversarial Networks (GANs), poses a significant issue in understanding what they truly …
Adversarial Networks (GANs), poses a significant issue in understanding what they truly …
Distributed chronicle for the fault diagnosis in distributed systems
J Aguilar, J Vizcarrondo - International Journal of …, 2020 - inderscienceonline.com
The chronicle paradigm has been used to determine the faults in distributed systems,
through the modelled of temporal relationships between observable events, which describe …
through the modelled of temporal relationships between observable events, which describe …