A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks
暂无分享,去创建一个
[1] Eryk Dutkiewicz,et al. Cyberattack detection in mobile cloud computing: A deep learning approach , 2017, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[2] Kai Hwang,et al. Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[3] Thomas Magedanz,et al. Utilizing M2M Technologies for Building Reliable Smart Cities , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[4] F. E. Grubbs. Procedures for Detecting Outlying Observations in Samples , 1969 .
[5] E. Anita,et al. A survey on data breach challenges in cloud computing security: Issues and threats , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).
[6] Michael Stonebraker,et al. Data Curation at Scale: The Data Tamer System , 2013, CIDR.
[7] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[8] Vrinda Tokekar,et al. An approach to analyze the impact of DDOS attack on mobile cloud computing , 2017, 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC).
[9] Yu Zheng,et al. Methodologies for Cross-Domain Data Fusion: An Overview , 2015, IEEE Transactions on Big Data.
[10] Thomas H. Morris,et al. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.
[11] Michael Stonebraker,et al. Text and structured data fusion in data tamer at scale , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[12] Abdul Razaque,et al. Intelligent intrusion detection system using clustered self organized map , 2018, 2018 Fifth International Conference on Software Defined Systems (SDS).
[13] Muttukrishnan Rajarajan,et al. Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.
[14] Zhiyuan Ma,et al. Autonomous mobile agent based intrusion detection framework in wireless body area networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[15] Felix Naumann,et al. Data fusion , 2009, CSUR.
[16] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[17] Andreas Hotho,et al. IP2Vec: Learning Similarities Between IP Addresses , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[18] Bijoy Antony Jose,et al. Performance analysis of virtualized embedded computing systems , 2017, 2017 7th International Symposium on Embedded Computing and System Design (ISED).
[19] Schahram Dustdar,et al. Winds of Change: From Vendor Lock-In to the Meta Cloud , 2013, IEEE Internet Computing.
[20] Sven Hartmann,et al. Cyber security challenges: An efficient intrusion detection system design , 2018, 2018 International Young Engineers Forum (YEF-ECE).
[21] Lior Rokach,et al. Decision forest: Twenty years of research , 2016, Inf. Fusion.
[22] Liping Li,et al. An Approach to Verifying Data Integrity for Cloud Storage , 2017, 2017 13th International Conference on Computational Intelligence and Security (CIS).
[23] Feng Tian,et al. Critical review of vendor lock-in and its impact on adoption of cloud computing , 2014, International Conference on Information Society (i-Society 2014).
[24] Vic Grout,et al. Reducing Packet Delay through Filter Merging , 2016, 2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC).
[25] Rajni Ranjan Singh Makwana,et al. Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms , 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI).
[26] Dina Moloja,et al. Towards a cloud intrusion detection and prevention system for M-voting in South Africa , 2017, 2017 International Conference on Information Society (i-Society).
[27] Yoonhee Kim,et al. A Hybrid Cloud Resource Clustering Method Using Analysis of Application Characteristics , 2017, 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[28] Jason Nieh,et al. ARM Virtualization: Performance and Architectural Implications , 2016, 2016 ACM/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA).
[29] Debasish Jana,et al. Efficient management of security and privacy issues in mobile cloud environment , 2013, 2013 Annual IEEE India Conference (INDICON).
[30] J. Nithisha,et al. An intelligent packet forwarding in router using self learning classifier , 2017, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM).
[31] Liu Yan,et al. Multi-sensor data fusion system based on Apache Storm , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).