Emergent Deep Learning for Anomaly Detection in Internet of Everything
暂无分享,去创建一个
[1] Meng Jiang,et al. A Survey on Data-driven Network Intrusion Detection , 2021, ACM Comput. Surv..
[2] Mohammad Reza Nosouhi,et al. Bushfire Risk Detection Using Internet of Things: An Application Scenario , 2021, IEEE Internet of Things Journal.
[3] Mohammad Nuruzzaman Bhuiyan,et al. Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities , 2021, IEEE Internet of Things Journal.
[4] Weishan Zhang,et al. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT , 2021, IEEE Internet of Things Journal.
[5] Gautam Srivastava,et al. Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.
[6] Bing Ouyang,et al. Initial Development of the Hybrid Aerial Underwater Robotic System (HAUCS): Internet of Things (IoT) for Aquaculture Farms , 2021, IEEE Internet of Things Journal.
[7] Samia Bouzefrane,et al. A modified LOF-based approach for outlier characterization in IoT , 2020, Annals of Telecommunications.
[8] Ali Kashif Bashir,et al. Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN , 2020, Future Gener. Comput. Syst..
[9] Milena Lazarova,et al. A Hybrid PSO-MiLOF Approach for Outlier Detection in Streaming Data , 2020, 2020 43rd International Conference on Telecommunications and Signal Processing (TSP).
[10] Djamel Djenouri,et al. DFIOT: Data Fusion for Internet of Things , 2020, Journal of Network and Systems Management.
[11] Ying Zhong,et al. HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning , 2020, Comput. Networks.
[12] D. Siracusa,et al. Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection , 2020, IEEE Transactions on Network and Service Management.
[13] Mohamed Amine Ferrag,et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..
[14] Jerry Chun-Wei Lin,et al. Exploring Pattern Mining Algorithms for Hashtag Retrieval Problem , 2020, IEEE Access.
[15] M. S. Desouki,et al. Big data analysis and distributed deep learning for next-generation intrusion detection system optimization , 2019, Journal of Big Data.
[16] John W. Polak,et al. Traffic Monitoring and Anomaly Detection based on Simulation of Luxembourg Road Network , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).
[17] Christian S. Jensen,et al. Outlier Detection for Time Series with Recurrent Autoencoder Ensembles , 2019, IJCAI.
[18] Albert Y. Zomaya,et al. A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.
[19] Robert H. Deng,et al. Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything , 2019, IEEE Internet of Things Journal.
[20] Georgios Kambourakis,et al. Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems , 2019, IEEE Access.
[21] Joel J. P. C. Rodrigues,et al. Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.
[22] Tankut Acarman,et al. A deep learning method to detect network intrusion through flow‐based features , 2018, Int. J. Netw. Manag..
[23] Karishma Pawar,et al. Deep learning approaches for video-based anomalous activity detection , 2019, World Wide Web.
[24] Philippe Fournier-Viger,et al. Fast and effective cluster-based information retrieval using frequent closed itemsets , 2018, Inf. Sci..
[25] Jianxin Li,et al. Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data , 2018, IEEE Transactions on Knowledge and Data Engineering.
[26] D. Djenouri,et al. Machine Learning for Smart Building Applications: Review and Taxonomy , 2018 .
[27] Tankut Acarman,et al. Classification of malware families based on runtime behaviors , 2017, J. Inf. Secur. Appl..
[28] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[29] George Karypis,et al. A Comparison of Document Clustering Techniques , 2000 .
[30] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[31] H. Edelsbrunner,et al. Efficient algorithms for agglomerative hierarchical clustering methods , 1984 .
[32] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .