暂无分享,去创建一个
Parisa Heidari | Daniel Migault | Abdallah Shami | Abdallah Moubayed | Amine Boukhtouta | Stere Preda | Adel Larabi | Li Yang | Richard Brunner | Amine Boukhtouta | A. Shami | Abdallah Moubayed | P. Heidari | D. Migault | Li Yang | Stere Preda | Adel Larabi | Richard Brunner
[1] Abdallah Shami,et al. Performance Analysis of SDP For Secure Internal Enterprises , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[2] Ramesh K. Sitaraman,et al. The Akamai network: a platform for high-performance internet applications , 2010, OPSR.
[3] Wushao Wen,et al. Application-Layer DDOS Detection Based on a One-Class Support Vector Machine , 2017 .
[4] Timo Hämäläinen,et al. Online anomaly detection using dimensionality reduction techniques for HTTP log analysis , 2015, Comput. Networks.
[5] Dipankar Raychaudhuri,et al. Exploiting ICN for Efficient Content Dissemination in CDNs , 2016, 2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[6] Guan Yong,et al. Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[7] Zhengping Fan,et al. Recent Developments in Content Delivery Network: A Survey , 2019, PAAP.
[8] Asha Rao,et al. Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study , 2016, ArXiv.
[9] Anees Shaikh,et al. Improving the resilience of content distribution networks to large scale distributed denial of service attacks , 2007, Comput. Networks.
[10] Haizhou Wang,et al. Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis , 2018, IET Commun..
[11] Hannes Federrath,et al. Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack , 2019, CCS.
[12] Abdallah Moubayed,et al. Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[13] Akanksha Gupta,et al. Detection of Cache Pollution Attacks in a Secure Information-Centric Network , 2021 .
[14] Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[15] Heejo Lee,et al. Detection of cache pollution attacks using randomness checks , 2012, 2012 IEEE International Conference on Communications (ICC).
[16] Abdallah Shami,et al. Software-Defined Perimeter (SDP): State of the Art Secure Solution for Modern Networks , 2019, IEEE Network.
[17] Abdallah Shami,et al. Multi-split optimized bagging ensemble model selection for multi-class educational data mining , 2020, Applied Intelligence.
[18] Sattar Hashemi,et al. Hybrid Intrusion Detection: Combining Decision Tree and Gaussian Mixture Model , 2017, 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).
[19] Shanto Roy,et al. DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots , 2019, 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT).
[20] Mohammad Hammoudeh,et al. Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges , 2015 .
[21] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[22] Abdallah Shami,et al. Systematic Ensemble Model Selection Approach for Educational Data Mining , 2020, Knowl. Based Syst..
[23] Markus Lienkamp,et al. Automotive Damper Defect Detection Using Novelty Detection Methods , 2019 .
[24] Hamed Yousefi,et al. iCDN: An NDN-based CDN , 2020, ICN.
[25] Arian Bär,et al. On the detection of network traffic anomalies in content delivery network services , 2014, 2014 26th International Teletraffic Congress (ITC).
[26] Parisa Heidari,et al. Machine Learning for Performance-Aware Virtual Network Function Placement , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[27] Hamed Yousefi,et al. Far Cry: Will CDNs Hear NDN's Call? , 2020, ICN.
[28] Jeffrey B Gouge. A Targeted Denial of Service Attack on Data Caching Networks , 2015 .
[29] Abdallah Shami,et al. Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection , 2020, 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[30] Aleksandar Kuzmanovic,et al. Pollution attacks and defenses for Internet caching systems , 2008, Comput. Networks.
[31] Jyoti Prakash Singh,et al. Intrusion detection system using anomaly technique in wireless sensor network , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[32] Gian Antonio Susto,et al. Anomaly Detection through on-line Isolation Forest: An application to plasma etching , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[33] Abdallah Shami,et al. Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[34] Abdallah Shami,et al. Distance-Based Anomaly Detection for Industrial Surfaces Using Triplet Networks , 2020, 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[35] Hanan Lutfiyya,et al. DNS Typo-Squatting Domain Detection: A Data Analytics & Machine Learning Based Approach , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[36] Abdallah Shami,et al. MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of Vehicles , 2021, IEEE Internet of Things Journal.
[37] Muhammad Zubair Shafiq,et al. Characterizing caching workload of a large commercial Content Delivery Network , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[38] Mengjun Xie,et al. Enhancing cache robustness for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM.
[39] Abdallah Shami,et al. Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection , 2020, IEEE Transactions on Network and Service Management.
[40] Manel Guerrero Zapata,et al. An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking , 2015, Comput. Networks.
[41] Andrew W. Moore,et al. Discriminators for use in flow-based classification , 2013 .
[42] Mauro Conti,et al. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.
[43] Li Yang,et al. Image-Based Visibility Estimation Algorithm for Intelligent Transportation Systems , 2018, IEEE Access.
[44] Sergio Caltagirone,et al. The Diamond Model of Intrusion Analysis , 2013 .
[45] Rafael Pinto,et al. Scalable and Incremental Learning of Gaussian Mixture Models , 2017, ArXiv.
[46] Sy-Yen Kuo,et al. Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[47] Michael Rabinovich,et al. Content Delivery Networks: Protection or Threat? , 2009, ESORICS.
[48] Trevor J. Bihl,et al. Feature extraction and feature selection for classifying cyber traffic threats , 2017 .
[49] Andreas Holzinger,et al. Interactive machine learning for health informatics: when do we need the human-in-the-loop? , 2016, Brain Informatics.
[50] Makan Pourzandi,et al. Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology , 2018, DBSec.
[51] A. Shami,et al. Student Engagement Level in an e-Learning Environment: Clustering Using K-means , 2020 .
[52] Abdallah Shami,et al. A Transfer Learning Framework for Anomaly Detection Using Model of Normality , 2020, 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[53] Shigeki Goto,et al. Detecting Malicious Websites by Learning IP Address Features , 2012, 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet.
[54] Ana R. Cavalli,et al. A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[55] Eric D. Ragan,et al. Soliciting Human-in-the-Loop User Feedback for Interactive Machine Learning Reduces User Trust and Impressions of Model Accuracy , 2020, HCOMP.
[56] Li Yang. Comprehensive Visibility Indicator Algorithm for Adaptable Speed Limit Control in Intelligent Transportation Systems , 2018 .
[57] Abdallah Shami,et al. A Lightweight Concept Drift Detection and Adaptation Framework for IoT Data Streams , 2021, IEEE Internet of Things Magazine.
[58] Marco Grangetto,et al. Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming , 2015, IEEE Transactions on Multimedia.
[59] Li Yang,et al. On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice , 2020, Neurocomputing.