TCN enhanced novel malicious traffic detection for IoT devices

L Xin, L Ziang, Z Yingli, Z Wenqiang, L Dong… - Connection …, 2022 - Taylor & Francis
With the development of IoT technology, more and more IoT devices are connected to the
network. Due to the hardware constraints of IoT devices themselves, it is difficult for …

Overview of AI-Models and Tools in Embedded IIoT Applications

P Dini, L Diana, A Elhanashi, S Saponara - Electronics, 2024 - mdpi.com
The integration of Artificial Intelligence (AI) models in Industrial Internet of Things (IIoT)
systems has emerged as a pivotal area of research, offering unprecedented opportunities for …

Anomaly detection for edge computing: A systematic literature review

S Sinha, DS Tomar, RK Pateriya - AIP Conference Proceedings, 2023 - pubs.aip.org
Edge computing has emerged as a promising tool to resolve the issues like high bandwidth
and privacy requirements for Internet of Things (IOT) devices that were not resolved by …

[HTML][HTML] Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins

X Liu, R Zhou, S Shimizu, R Chong, Q Zhou… - Digital Communications …, 2023 - Elsevier
As smart contracts, represented by Solidity, become deeply integrated into the
manufacturing industry, blockchain-based Digital Twins (DT) has gained momentum in …

Detection of SQL Injection and Cross-Site Scripting Based on Multi-Model CNN Combined with Bidirectional GRU and Multi-Head Self-Attention

WC Hsiao, CH Wang - 2023 5th International Conference on …, 2023 - ieeexplore.ieee.org
Both SQL injection and cross-site scripting (XSS) are critical threats in the field of web
application and API security. According to the literatures and our experiments, use individual …

Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks

Y Liu, Y Chen, H Zhang, Q Zhou… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
With the rapid development of society, network technology continues to advance. At the
same time, people are also facing threats from malicious traffic. To address this issue, this …

A malicious traffic detection method based on Bayesian meta-learning for few samples

Z Liu, Z Lv, L Zhao, M Li, X Liu - International Journal of …, 2023 - inderscienceonline.com
Realistic network environments have difficulties collecting malicious traffic data, and training
network models with virtually generated traffic data are inevitably disconnected from the real …

Research on malicious traffic detection based on image recognition

W Li, Y Chen, L Zhao, Y Luo… - International Journal of …, 2023 - inderscienceonline.com
With the rapid development of the internet, information security problems caused by
malicious traffic are becoming more and more serious. Malicious traffic invades the target …

A Novel Mobile Agent-Based Intrusion Detection Framework For Network Security Using Sl-Gat And Pp-FQCC

RS Kushwah, KK Prasad - Educational Administration: Theory and …, 2024 - kuey.net
Mobile Agent is known as a software component that collects the data from hosts in the
network. However, security is a major problem in MA. Therefore, IDS is used to detect …

Analisis Perbandingan Behavior User Menggunakan Low Interaction Honeypot dan IDS pada Sistem Edge Computing

MW Marzuqon, A Prihanto - Journal of Informatics and …, 2022 - ejournal.unesa.ac.id
Saat ini perkembangan Edge computing semakin pesat, perkembangan ini juga disertai
dengan ancaman yang begitu besar. Egde server merupakan sistem yang rentan terkena …