3   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Yiran Hao, Yiqiang Sheng and Jinlin Wang    
We use the proposed packet2vec learning algorithm for IDS preprocessing, the basic steps of IDS are as follows. First, the originally collected traffic is split into packets to be truncated into fixed length. Next, the packet2vec learning algorithm is us... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Seongmin Park, Byungsun Cho, Dowon Kim and Ilsun You    
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long ago and has seen technological advancement along with an extensive 5G footprint. Prior studies, and still newer ones, in the realm of DDoS attacks in the 5G envir... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ren-Hung Hwang, Min-Chun Peng, Van-Linh Nguyen and Yu-Lun Chang    
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malici... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »