Network traffic anomaly detection algorithm using mahout classifier

[1]  George Karabatis,et al.  Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[2]  Ning Jifeng,et al.  Classifier Ensemble Algorithm for Data Stream with Attribute Uncertainty , 2016 .

[3]  Mohamed Elhoseny,et al.  An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.

[4]  Weiping Zhang,et al.  Fuzzy theoretic approach to signals and systems: Static systems , 2017, Inf. Sci..

[5]  Simone Paolo Ponzetto,et al.  Collaboratively built semi-structured content and Artificial Intelligence: The story so far , 2013, Artif. Intell..

[6]  Andrew J. Clark,et al.  Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..

[7]  Mian Zhang,et al.  Based on pattern discovery network anomaly detection algorithm , 2010, 2010 5th International Conference on Computer Science & Education.

[8]  Zhixin Sun,et al.  A Detection Method for Anomaly Flow in Software Defined Network , 2018, IEEE Access.

[9]  Mohit Kumar,et al.  Analytical fuzzy approach to biological data analysis , 2017, Saudi journal of biological sciences.

[10]  Mohamed Elhoseny,et al.  Data Security and Challenges in Smart Cities , 2018, Security in Smart Cities: Models, Applications, and Challenges.

[11]  Jeremy B. Day,et al.  Classification of Voluntary Cough Airflow Patterns for Prediction of Abnormal Spirometry , 2016, IEEE Journal of Biomedical and Health Informatics.

[12]  Kerstin Thurow,et al.  A Context-Aware mHealth System for Online Physiological Monitoring in Remote Healthcare , 2015, Int. J. Comput. Commun. Control.

[13]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[14]  Fang Liu,et al.  Anomaly traffic detection of database network based on flow statistical feature , 2010 .

[15]  Zhao Ping Algorithm Research on Anomaly Detection Confidence Interval Flow Based on Sliding Time Window , 2013 .

[16]  Mohamed Elhoseny,et al.  Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.

[17]  Nerijus Paulauskas,et al.  Local outlier factor use for the network flow anomaly detection , 2015, Secur. Commun. Networks.

[18]  Mohamed Elhoseny,et al.  A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..

[19]  Marc A. Rosen,et al.  Optimization with a simulated annealing algorithm of a hybrid system for renewable energy including battery and hydrogen storage , 2018, Energy.

[20]  Cui Yan-na A Model of Anomaly Network Flow Detection , 2013 .

[21]  Marina Ruggieri,et al.  Editorial: Special Issue on “Future Wireless Ecosystems (FWE)” , 2018, Wirel. Pers. Commun..

[22]  Nerijus Paulauskas,et al.  Outlier Detection Method Use for the Network Flow Anomaly Detection , 2016 .

[23]  D. Hassabis,et al.  Neuroscience-Inspired Artificial Intelligence , 2017, Neuron.

[24]  McCarthyJohn Generality in artificial intelligence , 1987 .

[25]  Prabir Kumar Biswas,et al.  Global abnormal events detection in crowded scenes using context location and motion-rich spatio-temporal volumes , 2017, IET Image Process..

[26]  Daniel E. O'Leary,et al.  Artificial Intelligence and Big Data , 2013, IEEE Intelligent Systems.

[27]  Dheerendra Mishra,et al.  Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card , 2018, Wirel. Pers. Commun..