IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction
暂无分享,去创建一个
Paul D. Yoo | Chan Yeob Yeun | Kamal Taha | A. Taufiq Asyhari | Lounis Chermak | Yoonchan Jhi | Seo Jin Lee | Y. Jhi | Paul Yoo | K. Taha | C. Yeun | A. Asyhari | L. Chermak | S. Lee
[1] Kwangjo Kim,et al. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach , 2016, WISA.
[2] Aladdin Ayesh,et al. Intelligent intrusion detection systems using artificial neural networks , 2018, ICT Express.
[3] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[4] Paul D. Yoo,et al. DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection , 2019, ARES.
[5] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[6] N. Jones,et al. Top 10 Strategic Technology Trends for 2019 , 2018 .
[7] Bamidele Adebisi,et al. Internet of Things: Evolution and technologies from a security perspective , 2020, Sustainable Cities and Society.
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[9] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[10] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[11] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[12] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[13] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[14] Ilsun You,et al. Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[15] Huaiyu Zhu. On Information and Sufficiency , 1997 .