TCN enhanced novel malicious traffic detection for IoT devices
With the development of IoT technology, more and more IoT devices are connected to the
network. Due to the hardware constraints of IoT devices themselves, it is difficult for …
network. Due to the hardware constraints of IoT devices themselves, it is difficult for …
Overview of AI-Models and Tools in Embedded IIoT Applications
The integration of Artificial Intelligence (AI) models in Industrial Internet of Things (IIoT)
systems has emerged as a pivotal area of research, offering unprecedented opportunities for …
systems has emerged as a pivotal area of research, offering unprecedented opportunities for …
Anomaly detection for edge computing: A systematic literature review
S Sinha, DS Tomar, RK Pateriya - AIP Conference Proceedings, 2023 - pubs.aip.org
Edge computing has emerged as a promising tool to resolve the issues like high bandwidth
and privacy requirements for Internet of Things (IOT) devices that were not resolved by …
and privacy requirements for Internet of Things (IOT) devices that were not resolved by …
[HTML][HTML] Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
As smart contracts, represented by Solidity, become deeply integrated into the
manufacturing industry, blockchain-based Digital Twins (DT) has gained momentum in …
manufacturing industry, blockchain-based Digital Twins (DT) has gained momentum in …
Detection of SQL Injection and Cross-Site Scripting Based on Multi-Model CNN Combined with Bidirectional GRU and Multi-Head Self-Attention
WC Hsiao, CH Wang - 2023 5th International Conference on …, 2023 - ieeexplore.ieee.org
Both SQL injection and cross-site scripting (XSS) are critical threats in the field of web
application and API security. According to the literatures and our experiments, use individual …
application and API security. According to the literatures and our experiments, use individual …
Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks
Y Liu, Y Chen, H Zhang, Q Zhou… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
With the rapid development of society, network technology continues to advance. At the
same time, people are also facing threats from malicious traffic. To address this issue, this …
same time, people are also facing threats from malicious traffic. To address this issue, this …
A malicious traffic detection method based on Bayesian meta-learning for few samples
Z Liu, Z Lv, L Zhao, M Li, X Liu - International Journal of …, 2023 - inderscienceonline.com
Realistic network environments have difficulties collecting malicious traffic data, and training
network models with virtually generated traffic data are inevitably disconnected from the real …
network models with virtually generated traffic data are inevitably disconnected from the real …
Research on malicious traffic detection based on image recognition
W Li, Y Chen, L Zhao, Y Luo… - International Journal of …, 2023 - inderscienceonline.com
With the rapid development of the internet, information security problems caused by
malicious traffic are becoming more and more serious. Malicious traffic invades the target …
malicious traffic are becoming more and more serious. Malicious traffic invades the target …
A Novel Mobile Agent-Based Intrusion Detection Framework For Network Security Using Sl-Gat And Pp-FQCC
RS Kushwah, KK Prasad - Educational Administration: Theory and …, 2024 - kuey.net
Mobile Agent is known as a software component that collects the data from hosts in the
network. However, security is a major problem in MA. Therefore, IDS is used to detect …
network. However, security is a major problem in MA. Therefore, IDS is used to detect …
Analisis Perbandingan Behavior User Menggunakan Low Interaction Honeypot dan IDS pada Sistem Edge Computing
MW Marzuqon, A Prihanto - Journal of Informatics and …, 2022 - ejournal.unesa.ac.id
Saat ini perkembangan Edge computing semakin pesat, perkembangan ini juga disertai
dengan ancaman yang begitu besar. Egde server merupakan sistem yang rentan terkena …
dengan ancaman yang begitu besar. Egde server merupakan sistem yang rentan terkena …