Ensemble classifiers for network intrusion detection using a novel network attack dataset
Due to the extensive use of computer networks, new risks have arisen, and improving the
speed and accuracy of security mechanisms has become a critical need. Although new …
speed and accuracy of security mechanisms has become a critical need. Although new …
A PCA-based method for IoT network traffic anomaly detection
DH Hoang, HD Nguyen - 2018 20th International conference …, 2018 - ieeexplore.ieee.org
Network operators need effective tools to quickly detect anomalies in traffic data for
identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT …
identifying network attacks. In contrast to traditional Internet, anomaly detection in IoT …
On-line anomaly detection with high accuracy
Traffic anomaly detection is critical for advanced Internet management. Existing detection
algorithms generally convert the high-dimensional data to a long vector, which compromises …
algorithms generally convert the high-dimensional data to a long vector, which compromises …
Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems
H Sadreazami, A Mohammadi, A Asif… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Cyber-physical systems have recently emerged in several practical engineering applications
where security and privacy are of paramount importance. This motivated the paper and a …
where security and privacy are of paramount importance. This motivated the paper and a …
Multi-agent-based unsupervised detection of energy consumption anomalies on smart campus
Y Weng, N Zhang, C Xia - IEEE Access, 2018 - ieeexplore.ieee.org
The smart campus is becoming a reality with the advancement of information and
communication technologies. For energy efficiency, it is essential to detect abnormal energy …
communication technologies. For energy efficiency, it is essential to detect abnormal energy …
Generative Adversarial Networks for Anomaly Detection: A Systematic Literature Review
S Noor, SU Bazai, MI Ghafoor, S Marjan… - 2023 4th …, 2023 - ieeexplore.ieee.org
In numerous research areas, anomaly identification is a major problem. Identifying and
properly classifying data as anomalous is a challenging task that is resolved in various …
properly classifying data as anomalous is a challenging task that is resolved in various …
Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles
X Tao, Y Peng, F Zhao, C Yang, B Qiang, Y Wang… - Ad Hoc Networks, 2021 - Elsevier
Recently, wireless network evolution has been primarily driven by a need for higher rates.
The ongoing deployment of 5G cellular systems is continuously exposing the inherent …
The ongoing deployment of 5G cellular systems is continuously exposing the inherent …
Developing an intelligent filtering technique for bring your own device network access control
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has
simplified computing by introducing the use of personally owned devices. These devices …
simplified computing by introducing the use of personally owned devices. These devices …
A semi-supervised model for network traffic anomaly detection
NH Duong, HD Hai - 2015 17th International Conference on …, 2015 - ieeexplore.ieee.org
Network traffic anomaly detection can help to early detect network attacks because hacker's
activities may result in unusual changes of network traffic, that are significant fluctuations …
activities may result in unusual changes of network traffic, that are significant fluctuations …
Detecting anomalous network traffic in IoT networks
DH Hoang, HD Nguyen - 2019 21st international conference …, 2019 - ieeexplore.ieee.org
Network operators need effective tools to quickly detect anomalies in traffic data for
identifying network attacks. In contrast to traditional Internet, detection of anomalous network …
identifying network attacks. In contrast to traditional Internet, detection of anomalous network …