咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 1 篇 信息与通信工程

主题

  • 4 篇 intrusion detect...
  • 1 篇 spam emails
  • 1 篇 internet of thin...
  • 1 篇 ensemble learnin...
  • 1 篇 transfer learnin...
  • 1 篇 neural networks
  • 1 篇 industrial cyber...
  • 1 篇 wireless sensor ...
  • 1 篇 low-complexity i...
  • 1 篇 phishing emails
  • 1 篇 cybersecurity
  • 1 篇 few shot learnin...
  • 1 篇 software-defined...
  • 1 篇 machine learning
  • 1 篇 dos attacks
  • 1 篇 federated learni...
  • 1 篇 artificial intel...
  • 1 篇 cyberattacks
  • 1 篇 web attacks
  • 1 篇 self supervised ...

机构

  • 2 篇 univ manouba ria...
  • 1 篇 prince sultan un...
  • 1 篇 prince sultan un...
  • 1 篇 edinburgh napier...
  • 1 篇 kumoh natl inst ...
  • 1 篇 kumoh natl inst ...
  • 1 篇 kumoh natl inst ...
  • 1 篇 univ jordan king...
  • 1 篇 politekn elekt n...
  • 1 篇 prince sultan un...

作者

  • 2 篇 boulila wadii
  • 2 篇 ben atitallah sa...
  • 2 篇 driss maha
  • 1 篇 buchanan bill
  • 1 篇 akter rubina
  • 1 篇 lee jae-min
  • 1 篇 moradpoor naghme...
  • 1 篇 almomani iman
  • 1 篇 clavie benjamin
  • 1 篇 zainudin ahmad
  • 1 篇 kim dong-seong
  • 1 篇 koubaa anis

语言

  • 4 篇 英文
检索条件"主题词=Intrusion Detection and Classification"
4 条 记 录,以下是1-10 订阅
排序:
Federated Learning Inspired Low-Complexity intrusion detection and classification Technique for SDN-Based Industrial CPS
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2023年 第3期20卷 2442-2459页
作者: Zainudin, Ahmad Akter, Rubina Kim, Dong-Seong Lee, Jae-Min Kumoh Natl Inst Technol Dept Elect Engn Gumi 39177 South Korea Politekn Elekt Negeri Surabaya Dept Elect Engn Surabaya 60111 Indonesia Kumoh Natl Inst Technol ICT Convergence Res Ctr Gumi 39177 Gyeongsangbuk South Korea Kumoh Natl Inst Technol Dept IT Convergence Engn Gumi 39177 South Korea
Unauthorized users may attack centralized controllers as an attractive target in software-defined networking (SDN)-based industrial cyber-physical systems (CPS). Managing high-complexity deep learning (DL)-based intru... 详细信息
来源: 评论
Strengthening Network intrusion detection in IoT Environments with Self-supervised Learning and Few Shot Learning  16th
Strengthening Network Intrusion Detection in IoT Environment...
收藏 引用
16th International Conference on Computational Collective Intelligence (ICCCI)
作者: Ben Atitallah, Safa Driss, Maha Boulila, Wadii Koubaa, Anis Prince Sultan Univ RIOTU Lab CCIS Riyadh 12435 Saudi Arabia Univ Manouba RIADI Lab Manouba 2010 Tunisia
The Internet of Things (IoT) has been introduced as a breakthrough technology that integrates intelligence into everyday objects, enabling high levels of connectivity between them. As the IoT networks grow and expand,... 详细信息
来源: 评论
An Effective detection and classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting  14th
An Effective Detection and Classification Approach for DoS A...
收藏 引用
14th International Conference on Computational Collective Intelligence (ICCCI)
作者: Ben Atitallah, Safa Driss, Maha Boulila, Wadii Almomani, Iman Univ Manouba RIADI Lab Manouba 2010 Tunisia Prince Sultan Univ Secur Engn Lab CCIS Riyadh 12435 Saudi Arabia Prince Sultan Univ Robot & Internet Of Things Lab Riyadh 12435 Saudi Arabia Univ Jordan King Abdullah 2 Sch Informat Technol CS Dept Amman 11942 Jordan
The Internet of Things (IoT) has been used in various critical fields, including healthcare, elderly surveillance, autonomous transportation, and energy management. As a result of its emergence, several IoT-based smar... 详细信息
来源: 评论
Employing Machine Learning Techniques for detection and classification of Phishing Emails
Employing Machine Learning Techniques for Detection and Clas...
收藏 引用
Computing Conference
作者: Moradpoor, Naghmeh Clavie, Benjamin Buchanan, Bill Edinburgh Napier Univ Sch Comp Edinburgh Midlothian Scotland
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or downloads malicious software through clicki... 详细信息
来源: 评论