Anomalies Detection in Fog Computing Architectures Using Deep Learning
暂无分享,去创建一个
S Smys | Subarna Shakya | S. Shakya | S. Smys | S Smys
[1] S. Smys,et al. Efficient cryptographic approach for data security in wireless sensor networks using MES V-U , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[2] Marimuthu Palaniswami,et al. Fog-Empowered Anomaly Detection in IoT Using Hyperellipsoidal Clustering , 2017, IEEE Internet of Things Journal.
[3] Abul Bashar,et al. SURVEY ON EVOLVING DEEP LEARNING NEURAL NETWORK ARCHITECTURES , 2019, December 2019.
[4] S. Smys,et al. Privacy preserving approaches in cloud computing , 2018, 2018 2nd International Conference on Inventive Systems and Control (ICISC).
[5] Manas Ranjan Patra,et al. A Novel Classification via Clustering Method for Anomaly Based Network Intrusion Detection System , 2009 .
[6] Manas Ranjan Patra,et al. A Hybrid Clustering Approach for Network Intrusion Detection Using Cobweb and FFT , 2009 .
[7] Senthil Kumar T. Dr,et al. EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK , 2019, Journal of ISMAC.
[8] S Smys,et al. DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING , 2019, Journal of Ubiquitous Computing and Communication Technologies.
[9] A. Praveena,et al. Prevention of inference attacks for private information in social networking sites , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[10] A. Praveena,et al. Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .
[11] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[12] Robert Bestak,et al. BIG DATA ANALYTICS FOR SMART CLOUD-FOG BASED APPLICATIONS , 2019, Journal of Trends in Computer Science and Smart Technology.
[13] Jennifer S. Raj,et al. Secure interoperable architecture construction for overlay networks , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[14] D Sivaganesan,et al. DESIGN AND DEVELOPMENT AI-ENABLED EDGE COMPUTING FOR INTELLIGENT-IOT APPLICATIONS , 2019, Journal of Trends in Computer Science and Smart Technology.
[15] S. Smys,et al. Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks , 2018, Wirel. Pers. Commun..