A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication
暂无分享,去创建一个
Anatoly Sachenko | Andrii Nicheporuk | Anastasiia Nicheporuk | Oleg Sachenko | Andrii Kazantsev | O. Sachenko | A. Sachenko | A. Nicheporuk | A. Nicheporuk | A. Kazantsev
[1] Sergii Lysenko,et al. BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks , 2019, CN.
[2] Sergii Lysenko,et al. A botnet detection approach based on the clonal selection algorithm , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[3] Sergii Lysenko,et al. Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search , 2017, ICTERI.
[4] Oleksandr Martynyuk,et al. Hidden Fault Analysis of FPGA Projects for Critical Applications , 2020, 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET).
[5] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[6] Sergii Lysenko,et al. Dynamic Signature-based Malware Detection Technique Based on API Call Tracing , 2019, ICTERI Workshops.
[7] Andreas Jacobsson,et al. On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[8] Paweł Dymora,et al. Anomaly Detection in IoT Communication Network Based on Spectral Analysis and Hurst Exponent , 2019, Applied Sciences.
[9] Oleg Savenko,et al. Multi-agent Based Approach of Botnet Detection in Computer Systems , 2012, CN.
[10] Olexander Barmak,et al. Using visual analytics to develop human and machine‐centric models: A review of approaches and proposed information technology , 2020, Comput. Intell..
[11] Oleg Savenko,et al. An Android Malware Detection Method Based on CNN Mixed-Data Model , 2020, ICTERI Workshops.
[12] Arunan Sivanathan,et al. IoT Behavioral Monitoring via Network Traffic Analysis , 2020, ArXiv.
[13] Oksana Pomorova,et al. Metamorphic Viruses Detection Technique Based on the the Modified Emulators , 2016, ICTERI.
[14] Masayuki Murata,et al. Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions , 2020, IEEE Transactions on Consumer Electronics.
[15] Leonid Bedratyuk,et al. The star sequence and the general first Zagreb index , 2017, 1706.00829.
[16] Zahid Ullah,et al. Internet of Things Security, Device Authentication and Access Control: A Review , 2019, ArXiv.
[17] Xingquan Zhu,et al. IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework , 2020, IoT.
[18] Viktor Melnyk,et al. Remote Synthesis of Computer Devices for FPGA-Based IoT Nodes , 2020, 2020 10th International Conference on Advanced Computer Information Technologies (ACIT).
[19] Fahad Algarni,et al. Challenges and Solutions for Applications and Technologies in the Internet of Things , 2017 .
[20] Sasu Tarkoma,et al. IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge , 2020, IEEE Transactions on Network and Service Management.
[21] R. Kitchin,et al. The (In)Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention , 2019, Smart Cities and Innovative Urban Technologies.
[22] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[23] Sergii Lysenko,et al. Detection of the botnets’ low-rate DDoS attacks based on self-similarity , 2020 .
[24] Qusay H. Mahmoud,et al. A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks , 2020, Electronics.
[25] Sergii Lysenko,et al. SVM-based Technique for Mobile Malware Detection , 2019, CMIS.
[26] Oleksandr Martynyuk,et al. Development of Checkability in FPGA Components of Safety-Related Systems , 2020, ICTES.
[27] Vijay Sivaraman,et al. Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[28] Oleksandr Martynyuk,et al. A method of the hidden faults elimination in FPGA projets for the critical applications , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[29] George Markowsky,et al. The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis , 2018, ICTERI Workshops.
[30] Ali Abd Almisreb,et al. DoS and DDoS vulnerability of IoT: A review , 2019, Sustainable Engineering and Innovation.
[31] Eduard Manziuk. Approach to creating an ensemble on a hierarchy of clusters using model decisions correlation , 2020 .
[32] Yu Chen,et al. Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[33] A. Melnyk,et al. Self-Configurable FPGA-Based Computer Systems , 2013 .
[34] Karuna Pande Joshi,et al. Anomaly Detection Models for Smart Home Security , 2019, 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).
[35] Sergii Lysenko,et al. Approach for the unknown metamorphic virus detection , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).