Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior
Anomaly-based intrusion detection systems identify the computer network behavior which
deviates from the statistical model of typical network behavior. Binary classifiers based on …
deviates from the statistical model of typical network behavior. Binary classifiers based on …
An efficient neuro deep learning intrusion detection system for mobile adhoc networks
N Venkateswaran, SP Prabaharan - EAI Endorsed Transactions on …, 2022 - eudl.eu
As of late mobile ad hoc networks (MANETs) have turned into a very popular explore the
theme. By giving interchanges without a fixed infrastructure MANETs are an appealing …
theme. By giving interchanges without a fixed infrastructure MANETs are an appealing …
[PDF][PDF] Intelligent Deep Learning Enabled Wild Forest Fire Detection System.
AS Almasoud - Computer Systems Science & Engineering, 2023 - cdn.techscience.cn
The latest advancements in computer vision and deep learning (DL) techniques pave the
way to design novel tools for the detection and monitoring of forest fires. In this view, this …
way to design novel tools for the detection and monitoring of forest fires. In this view, this …
English Teaching in Artificial Intelligence-based Higher Vocational Education Using Machine Learning Techniques for Students' Feedback Analysis and Course …
X Ma - JUCS: Journal of Universal Computer Science, 2022 - search.ebscohost.com
Higher vocational education is a self-contained method of higher education that is aligned
with global productivity and economic development. Its goal is to develop talented workers …
with global productivity and economic development. Its goal is to develop talented workers …
A novel approach to intrusion detection using zero-shot learning hybrid partial labels
Computer networks have become the backbone of our interconnected world in today's
technologically driven landscape. Unauthorized access or malicious activity carried out by …
technologically driven landscape. Unauthorized access or malicious activity carried out by …
[PDF][PDF] Prediction of Low-Energy Building Energy Consumption Based on Genetic BP Algorithm.
Y Lu, X Gong, AB Kipnis - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Combined with the energy consumption data of individual buildings in the logistics group of
Yangtze University, the analysis model scheme of energy consumption of individual …
Yangtze University, the analysis model scheme of energy consumption of individual …
[PDF][PDF] Intelligent Deep Convolutional Neural Network Based Object Detection Model for Visually Challenged People.
SK Devi, AA Albraikan, FN Al-Wesabi… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Artificial Intelligence (AI) and Computer Vision (CV) advancements have led to many useful
methodologies in recent years, particularly to help visually-challenged people. Object …
methodologies in recent years, particularly to help visually-challenged people. Object …
[图书][B] Artificial Intelligence and Security: 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part III
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings
of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which …
of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which …
Rat Swarm Optimization with Improved Gated Recurrent Unit for Intrusion Detection System.
A Parabathina, M Dabbiru… - International Journal of …, 2024 - search.ebscohost.com
Abstract The Intrusion Detection System (IDS) has gained significant attention due to
enhanced network utilization. However, various types of IDS approaches have been …
enhanced network utilization. However, various types of IDS approaches have been …
Cognitive Computing with Deep Learning based Cybersecurity Solution for Human Computer Interface Applications
A Srivastava, S Stager - … on Data Science and Network Security …, 2024 - ieeexplore.ieee.org
In the rapidly evolving domain of cybersecurity, the gap between the need for skilled
professionals and the available workforce is widening, with over 35,000 open positions in …
professionals and the available workforce is widening, with over 35,000 open positions in …