Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication
暂无分享,去创建一个
Cheng Hong | Shah Nazir | Zhiwei Gu | Sulaiman Khan | S. Nazir | Sulaiman Khan | Zhiwei Gu | Cheng Hong
[1] Igor V. Kotenko,et al. Computer attack modeling and security evaluation based on attack graphs , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).
[2] Vijay Laxmi,et al. AndroTaint: An efficient android malware detection framework using dynamic taint analysis , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).
[3] Yu Cheng,et al. Security Analysis of Mobile Device-to-Device Network Applications , 2019, IEEE Internet of Things Journal.
[4] Zhiyong Zhang,et al. A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory , 2017, J. Comput. Sci..
[5] Aziz Mohaisen,et al. Android Malware Detection Using Complex-Flows , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[6] Zahid Ullah,et al. KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features , 2018 .
[7] P. Subsorn,et al. A COMPARATIVE ANALYSIS OF INTERNET BANKING SECURITY IN THAILAND: A CUSTOMER PERSPECTIVE , 2012 .
[8] Munam Ali Shah,et al. Survey on security threats of smartphones in Internet of Things , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).
[9] Hao Hao Song,et al. Testing and Evaluation System for Cloud Computing Information Security Products , 2020 .
[10] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[11] Yan Song,et al. An end-to-end model for Android malware detection , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[12] Juha Karhunen,et al. A pragmatic android malware detection procedure , 2017, Comput. Secur..
[13] Md. Zakirul Alam Bhuiyan,et al. Security and Attack Vector Analysis of IoT Devices , 2017, SpaCCS Workshops.
[14] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[15] Amala V. Rajan,et al. Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).
[16] Srikanta Patnaik,et al. Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology , 2020, Internet Things.
[17] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[18] Yi An,et al. Ecological security evaluation based on entropy matter-element model: A case study of Kunming city, southwest China , 2019, Ecological Indicators.
[19] Jin Li,et al. The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..
[20] Vijay Sivaraman,et al. Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.
[21] Jassim Happa,et al. GARMDROID: IoT Potential Security Threats Analysis Through the Inference of Android Applications Hardware Features Requirements , 2017 .
[22] Divya Bansal,et al. Zero-day malware detection , 2016, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).
[23] Stefanos Gritzalis,et al. Evolution and Trends in IoT Security , 2018, Computer.
[24] Habib Ullah Khan,et al. Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review , 2020, IEEE Access.
[25] Andreas Pitsillides,et al. Mobile Phone Computing and the Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[26] Jinfeng Yi,et al. EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples , 2017, AAAI.
[27] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[28] Xin Su,et al. Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures , 2018, Secur. Commun. Networks.
[29] Ateeq Ur Rehman,et al. Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy , 2019, Lecture Notes in Networks and Systems.
[30] Jiahang Yuan,et al. Regional energy security performance evaluation in China using MTGS and SPA-TOPSIS. , 2019, The Science of the total environment.
[31] Murthy V. Jonnalagedda,et al. Clustering based on correlation fractal dimension over an evolving data stream , 2018, Int. Arab J. Inf. Technol..
[32] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[33] Andrea Zanella,et al. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.
[34] Habib Ullah Khan,et al. Modelling Features-Based Birthmarks for Security of End-to-End Communication System , 2020, Secur. Commun. Networks.
[35] Zhihua Wang,et al. FgDetector: Fine-Grained Android Malware Detection , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).
[36] Ali Feizollah,et al. AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection , 2017, Comput. Secur..
[37] Agusti Solanas,et al. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.
[38] Mahdi Abadi,et al. AMD-EC: Anomaly-based Android malware detection using ensemble classifiers , 2017, 2017 Iranian Conference on Electrical Engineering (ICEE).
[39] Mbarek Marwan,et al. Security Enhancement in Healthcare Cloud using Machine Learning , 2018 .
[40] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[41] Wendy Ivins,et al. A multifaceted evaluation of the reference model of information assurance & security , 2016, Comput. Secur..
[42] Petros Spachos,et al. Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey , 2020, J. Netw. Comput. Appl..
[43] Donald F. Towsley,et al. Security importance assessment for system objects and malware detection , 2017, Comput. Secur..
[44] Igor V. Kotenko,et al. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[45] Shah Nazir,et al. Evaluating Security of Software Components Using Analytic Network Process , 2013, 2013 11th International Conference on Frontiers of Information Technology.
[46] Helmut Krcmar,et al. A comprehensive model of information security factors for decision-makers , 2020, Comput. Secur..
[47] Zarul Fitri Zaaba,et al. A Review of Usability and Security Evaluation Model of Ecommerce Website , 2019, Procedia Computer Science.
[48] Latifa Ben Arfa Rabai,et al. A Multidimensional Approach towards a Quantitative Assessment of Security Threats , 2015, ANT/SEIT.
[49] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[50] Muhammad Imran,et al. Deep learning and big data technologies for IoT security , 2020, Comput. Commun..
[51] Debabrata Samanta,et al. An Overview: Security Issue in IoT Network , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.
[52] Shah Nazir,et al. Fuzzy logic based decision support system for component security evaluation , 2018, Int. Arab J. Inf. Technol..
[53] Sabu M. Thampi,et al. Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things , 2019, Pervasive Mob. Comput..