AI Enhanced Automatic Response System for Resisting Network Threats
暂无分享,去创建一个
Meikang Qiu | Meiqin Liu | Song Xia | Hui Zhao | Ming Zhong | Meiqin Liu | Meikang Qiu | Hui Zhao | Song Xia | Mingquan Zhong
[1] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[2] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[3] Keke Gai,et al. An Investigation on Cyber Security Threats and Security Models , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[4] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[5] Jun Guo,et al. Variational Bayesian Learning for Dirichlet Process Mixture of Inverted Dirichlet Distributions in Non-Gaussian Image Feature Modeling , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[6] Meikang Qiu,et al. A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.
[7] Audun Josang,et al. Vulnerabilities in personal firewalls caused by poor security usability , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[8] Zhihui Lu,et al. Fusion of Cognitive Wireless Networks and Edge Computing , 2019, IEEE Wireless Communications.
[9] Zhen Yang,et al. Decorrelation of Neutral Vector Variables: Theory and Applications , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[10] Ali Dehghantanha,et al. A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..
[11] Jesus Mena,et al. Investigative Data Mining for Security and Criminal Detection , 2002 .
[12] Yue Wu,et al. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..
[13] D. Shalini Punithavathani,et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence , 2014, Cluster Computing.
[14] Frank S. Rietta. Application layer intrusion detection for SQL injection , 2006, ACM-SE 44.
[15] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[16] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..
[17] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[18] Keke Gai,et al. Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing , 2018, J. Parallel Distributed Comput..