Network traffic anomaly detection algorithm using mahout classifier
暂无分享,去创建一个
Liang Liu | Jiayong Liu | Hua Peng | Jiayong Liu | Johnwb R. Lewis | Liang Liu | Hua Peng | Jiayong Liu | John Lewis | Liang Liu | Hua Peng
[1] George Karabatis,et al. Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[2] Ning Jifeng,et al. Classifier Ensemble Algorithm for Data Stream with Attribute Uncertainty , 2016 .
[3] Mohamed Elhoseny,et al. An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.
[4] Weiping Zhang,et al. Fuzzy theoretic approach to signals and systems: Static systems , 2017, Inf. Sci..
[5] Simone Paolo Ponzetto,et al. Collaboratively built semi-structured content and Artificial Intelligence: The story so far , 2013, Artif. Intell..
[6] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[7] Mian Zhang,et al. Based on pattern discovery network anomaly detection algorithm , 2010, 2010 5th International Conference on Computer Science & Education.
[8] Zhixin Sun,et al. A Detection Method for Anomaly Flow in Software Defined Network , 2018, IEEE Access.
[9] Mohit Kumar,et al. Analytical fuzzy approach to biological data analysis , 2017, Saudi journal of biological sciences.
[10] Mohamed Elhoseny,et al. Data Security and Challenges in Smart Cities , 2018, Security in Smart Cities: Models, Applications, and Challenges.
[11] Jeremy B. Day,et al. Classification of Voluntary Cough Airflow Patterns for Prediction of Abnormal Spirometry , 2016, IEEE Journal of Biomedical and Health Informatics.
[12] Kerstin Thurow,et al. A Context-Aware mHealth System for Online Physiological Monitoring in Remote Healthcare , 2015, Int. J. Comput. Commun. Control.
[13] Xiaohui Yuan,et al. An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.
[14] Fang Liu,et al. Anomaly traffic detection of database network based on flow statistical feature , 2010 .
[15] Zhao Ping. Algorithm Research on Anomaly Detection Confidence Interval Flow Based on Sliding Time Window , 2013 .
[16] Mohamed Elhoseny,et al. Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.
[17] Nerijus Paulauskas,et al. Local outlier factor use for the network flow anomaly detection , 2015, Secur. Commun. Networks.
[18] Mohamed Elhoseny,et al. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..
[19] Marc A. Rosen,et al. Optimization with a simulated annealing algorithm of a hybrid system for renewable energy including battery and hydrogen storage , 2018, Energy.
[20] Cui Yan-na. A Model of Anomaly Network Flow Detection , 2013 .
[21] Marina Ruggieri,et al. Editorial: Special Issue on “Future Wireless Ecosystems (FWE)” , 2018, Wirel. Pers. Commun..
[22] Nerijus Paulauskas,et al. Outlier Detection Method Use for the Network Flow Anomaly Detection , 2016 .
[23] D. Hassabis,et al. Neuroscience-Inspired Artificial Intelligence , 2017, Neuron.
[24] McCarthyJohn. Generality in artificial intelligence , 1987 .
[25] Prabir Kumar Biswas,et al. Global abnormal events detection in crowded scenes using context location and motion-rich spatio-temporal volumes , 2017, IET Image Process..
[26] Daniel E. O'Leary,et al. Artificial Intelligence and Big Data , 2013, IEEE Intelligent Systems.
[27] Dheerendra Mishra,et al. Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card , 2018, Wirel. Pers. Commun..