Transfer learning: Survey and classification
A key notion in numerous data mining and machine learning (ML) algorithms says that the
training data and testing data are essentially in the similar feature space and also have the …
training data and testing data are essentially in the similar feature space and also have the …
Machine learning-based botnet detection in software-defined network: A systematic review
In recent decades, the internet has grown and changed the world tremendously, and this, in
turn, has brought about many cyberattacks. Cybersecurity represents one of the most …
turn, has brought about many cyberattacks. Cybersecurity represents one of the most …
A hybrid deep learning approach for bottleneck detection in IoT
Cloud computing is perhaps the most enticing innovation in the present figuring situation. It
gives an expense-effective arrangement by diminishing the enormous forthright expense of …
gives an expense-effective arrangement by diminishing the enormous forthright expense of …
Raw network traffic data preprocessing and preparation for automatic analysis
B Alothman - 2019 International Conference on Cyber Security …, 2019 - ieeexplore.ieee.org
Monitoring network traffic and trying to detect malicious activities are two of the high
significance tasks carried out by Computer Security Incident Response Teams (CSIRTs) …
significance tasks carried out by Computer Security Incident Response Teams (CSIRTs) …
Improving botnet detection with recurrent neural network and transfer learning
Botnet detection is a critical step in stopping the spread of botnets and preventing malicious
activities. However, reliable detection is still a challenging task, due to a wide variety of …
activities. However, reliable detection is still a challenging task, due to a wide variety of …
Transfer learning approach for botnet detection based on recurrent variational autoencoder
Machine Learning (ML) methods have been widely used in Intrusion Detection Systems
(IDS). In particular, many botnet detection methods are based on ML. However, due to the …
(IDS). In particular, many botnet detection methods are based on ML. However, due to the …
Smart prediction system for classifying mirai and gafgyt attacks on iot devices
R Aldawod, N Alsaleh, N Aldalbahi… - 2022 International …, 2022 - ieeexplore.ieee.org
The proliferation of Botnet attacks on IoT devices indicates that IoT network traffics is more
vulnerable than other IT-based device network traffic. Mitigating this threat has led to new …
vulnerable than other IT-based device network traffic. Mitigating this threat has led to new …
A recognition method of basketball's shooting trajectory based on transfer learning
F Meng, T Yang - Mobile Networks and Applications, 2022 - Springer
Due to the low recognition accuracy and slow convergence speed of the traditional
basketball shooting trajectory recognition methods, this paper proposes a basketball …
basketball shooting trajectory recognition methods, this paper proposes a basketball …
Class balanced similarity-based instance transfer learning for botnet family classification
Abstract The use of Transfer Learning algorithms for enhancing the performance of machine
learning algorithms has gained attention over the last decade. In this paper we introduce an …
learning algorithms has gained attention over the last decade. In this paper we introduce an …
[PDF][PDF] Robust Botnet Detection Techniques for Mobile and Network Environments
B Alothman - 2019 - dora.dmu.ac.uk
Cybercrime costs large amounts of money and resources every year. This is because it is
usually carried out using different methods and at different scales. The use of botnets is one …
usually carried out using different methods and at different scales. The use of botnets is one …