Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network
暂无分享,去创建一个
Qinghe Du | Bo Sun | Bilal Hussain | Zhiqiang Han | Bo Sun | Bilal Hussain | Qinghe Du | Zhiqiang Han
[1] Daniel L. Marino,et al. Generalization of Deep Learning for Cyber-Physical System Security: A Survey , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[2] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[3] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[4] Jiliang Tang,et al. How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks , 2018, 2018 IEEE International Conference on Communications (ICC).
[5] Songwu Lu,et al. How voice call technology poses security threats in 4G LTE networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[6] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[7] Lei Gao,et al. A Traffic Based Lightweight Attack Detection Scheme for VoLTE , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[8] Dimitrios Tzovaras,et al. Behavioural Network Traffic Analytics for Securing 5G Networks , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[9] Qinghe Du,et al. Social-Aware D2D Relay Networks for Stability Enhancement: An Optimal Stopping Approach , 2018, IEEE Transactions on Vehicular Technology.
[10] Aman Gupta,et al. Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[11] Carles Antón-Haro,et al. 5G Mobile Cellular Networks: Enabling Distributed State Estimation for Smart Grids , 2017, IEEE Communications Magazine.
[12] Susana Sargento,et al. Enabling Cyber-Physical Systems for 5G Networking: A Case Study on the Automotive Vertical Domain , 2018, 2018 IEEE/ACM 4th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).
[13] Pinyi Ren,et al. Deep Learning-Based Big Data-Assisted Anomaly Detection in Cellular Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[14] Songwu Lu,et al. New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks , 2016, CCS.
[15] Masood Khosroshahy,et al. Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).
[16] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[17] Dimitrios Tzovaras,et al. A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks , 2016, IEEE Transactions on Mobile Computing.
[18] Quoc V. Le,et al. Searching for Activation Functions , 2018, arXiv.
[19] Mohammed Atiquzzaman,et al. LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey , 2018, IEEE Access.
[20] Daniel K. Samaan,et al. The economics of artificial intelligence : Implications for the future of work * , 2018 .
[21] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[23] Ayman I. Kayssi,et al. Signaling oriented denial of service on LTE networks , 2012, MobiWac '12.
[24] Georges Kaddoum,et al. Survey on Threats and Attacks on Mobile Networks , 2016, IEEE Access.
[25] Marco De Nadai,et al. A multi-source dataset of urban life in the city of Milan and the Province of Trentino , 2015, Scientific Data.
[26] Gerald Kunzmann,et al. Understanding mobile Internet usage behavior , 2014, 2014 IFIP Networking Conference.
[27] Juergen Jasperneite,et al. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.
[28] Moses Garuba,et al. Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network , 2017, IEEE Transactions on Industrial Informatics.
[29] Roger Piqueras Jover,et al. Anomaly detection in cellular Machine-to-Machine communications , 2013, 2013 IEEE International Conference on Communications (ICC).
[30] Sabina Jeschke,et al. Industrial Internet of Things: Cybermanufacturing Systems , 2016 .
[31] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.