State-of-the-art in artificial neural network applications: A survey
This is a survey of neural network applications in the real-world scenario. It provides a
taxonomy of artificial neural networks (ANNs) and furnish the reader with knowledge of …
taxonomy of artificial neural networks (ANNs) and furnish the reader with knowledge of …
Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures
The evolving trends of mobility, cloud computing and collaboration have blurred the
perimeter separating corporate networks from the wider world. These new tools and …
perimeter separating corporate networks from the wider world. These new tools and …
[PDF][PDF] Darknet Security: A Categorization of Attacks to the Tor Network.
E Cambiaso, I Vaccari, L Patti, M Aiello - ITASEC, 2019 - ceur-ws.org
In the darknet security topic, it is important to analyze the threats that characterize the
network. This paper deeply investigates the literature of attacks against the Tor network …
network. This paper deeply investigates the literature of attacks against the Tor network …
[PDF][PDF] Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop
I Riadi, P Widiandana - Jurnal RESTI (Rekayasa Sistem Dan …, 2020 - jurnal.iaii.or.id
Cyberbullying in group conversations in one of the instant messaging applications is one of
the conflicts that occur due to social media, specifically WhatsApp. This study conducted …
the conflicts that occur due to social media, specifically WhatsApp. This study conducted …
[PDF][PDF] Network packet classification using neural network based on training function and hidden layer neuron number variation
I Riadi, AW Muhammad - International Journal of Advanced …, 2017 - researchgate.net
Distributed denial of service (DDoS) is a structured network attack coming from various
sources and fused to form a large packet stream. DDoS packet stream pattern behaves as …
sources and fused to form a large packet stream. DDoS packet stream pattern behaves as …
Analysis of the paradigm on tor attack studies
MAIM Aminuddin, ZF Zaaba… - 2020 8th …, 2020 - ieeexplore.ieee.org
The massive popularity of Tor as an anonymity platform is undeniable as researchers have
studied multiple attacks on the platform. With various attack studies that had been published …
studied multiple attacks on the platform. With various attack studies that had been published …
Anonymity networks and the fragile cyber ecosystem
It is well known that government agencies have had the capability to eavesdrop on public
switched telephone networks for many decades. 1 However, with the growing use of the …
switched telephone networks for many decades. 1 However, with the growing use of the …
Analisis Statistik Log Jaringan Untuk Deteksi Serangan DDoS Berbasis Neural Network
Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas,
dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi …
dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi …
Multischeme feedforward artificial neural network architecture for DDoS attack detection
AW Muhammad, CFM Foozy… - Bulletin of Electrical …, 2021 - beei.org
Distributed denial of service attack classified as a structured attack to deplete server,
sourced from various bot computers to form a massive data flow. Distributed denial of …
sourced from various bot computers to form a massive data flow. Distributed denial of …
Application of fuzzy logic for selection of actor nodes in wsans—implementation of two fuzzy-based systems and a testbed
The development of sensor networks and the importance of smart devices in the physical
world has brought attention to Wireless Sensor and Actor Networks (WSANs). They consist …
world has brought attention to Wireless Sensor and Actor Networks (WSANs). They consist …