State-of-the-art in artificial neural network applications: A survey

OI Abiodun, A Jantan, AE Omolara, KV Dada… - Heliyon, 2018 - cell.com
This is a survey of neural network applications in the real-world scenario. It provides a
taxonomy of artificial neural networks (ANNs) and furnish the reader with knowledge of …

Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures

JF Colom, D Gil, H Mora, B Volckaert… - Journal of Network and …, 2018 - Elsevier
The evolving trends of mobility, cloud computing and collaboration have blurred the
perimeter separating corporate networks from the wider world. These new tools and …

[PDF][PDF] Darknet Security: A Categorization of Attacks to the Tor Network.

E Cambiaso, I Vaccari, L Patti, M Aiello - ITASEC, 2019 - ceur-ws.org
In the darknet security topic, it is important to analyze the threats that characterize the
network. This paper deeply investigates the literature of attacks against the Tor network …

[PDF][PDF] Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop

I Riadi, P Widiandana - Jurnal RESTI (Rekayasa Sistem Dan …, 2020 - jurnal.iaii.or.id
Cyberbullying in group conversations in one of the instant messaging applications is one of
the conflicts that occur due to social media, specifically WhatsApp. This study conducted …

[PDF][PDF] Network packet classification using neural network based on training function and hidden layer neuron number variation

I Riadi, AW Muhammad - International Journal of Advanced …, 2017 - researchgate.net
Distributed denial of service (DDoS) is a structured network attack coming from various
sources and fused to form a large packet stream. DDoS packet stream pattern behaves as …

Analysis of the paradigm on tor attack studies

MAIM Aminuddin, ZF Zaaba… - 2020 8th …, 2020 - ieeexplore.ieee.org
The massive popularity of Tor as an anonymity platform is undeniable as researchers have
studied multiple attacks on the platform. With various attack studies that had been published …

Anonymity networks and the fragile cyber ecosystem

H Haughey, G Epiphaniou, HM Al-Khateeb - Network Security, 2016 - Elsevier
It is well known that government agencies have had the capability to eavesdrop on public
switched telephone networks for many decades. 1 However, with the growing use of the …

Analisis Statistik Log Jaringan Untuk Deteksi Serangan DDoS Berbasis Neural Network

AW Muhammad, I Riadi, S Sunardi - ILKOM Jurnal Ilmiah, 2016 - jurnal.fikom.umi.ac.id
Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas,
dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi …

Multischeme feedforward artificial neural network architecture for DDoS attack detection

AW Muhammad, CFM Foozy… - Bulletin of Electrical …, 2021 - beei.org
Distributed denial of service attack classified as a structured attack to deplete server,
sourced from various bot computers to form a massive data flow. Distributed denial of …

Application of fuzzy logic for selection of actor nodes in wsans—implementation of two fuzzy-based systems and a testbed

D Elmazi, M Cuka, M Ikeda, K Matsuo, L Barolli - Sensors, 2019 - mdpi.com
The development of sensor networks and the importance of smart devices in the physical
world has brought attention to Wireless Sensor and Actor Networks (WSANs). They consist …