30   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Ibrahim Obeidat,Nabhan Hamadneh,Mouhammd Alkasassbeh,Mohammad Almseidin,Mazen Ibrahim AlZubi     Pág. pp. 70 - 84
Abstract? Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the IDS m... ver más

 
en línea
Cristian González García and Eva Álvarez-Fernández    
Big Data has changed how enterprises and people manage knowledge and make decisions. However, when talking about Big Data, so many times there are different definitions about what it is and what it is used for, as there are many interpretations and disag... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi    
Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Nhamoinesu Mtetwa, Abbas Javed and Jawad Ahmad    
The exponential growth of internet communications and increasing dependency of users upon software-based systems for most essential, everyday applications has raised the importance of network security. As attacks are on the rise, cybersecurity should be ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Kanza Gulzar, Muhammad Ayoob Memon, Syed Muhammad Mohsin, Sheraz Aslam, Syed Muhammad Abrar Akber and Muhammad Asghar Nadeem    
In the public health sector and the field of medicine, the popularity of data mining and its usage in knowledge discovery and databases (KDD) are rising. The growing popularity of data mining has discovered innovative healthcare links to support decision... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yuelei Xiao and Xing Xiao    
Residual networks (ResNets) are prone to over-fitting for low-dimensional and small-scale datasets. And the existing intrusion detection systems (IDSs) fail to provide better performance, especially for remote-to-local (R2L) and user-to-root (U2R) attack... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Maya Hilda Lestari Louk and Bayu Adhi Tama    
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challenging ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Vikas Tomer and Sachin Sharma    
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amoun... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
D.A. Safronov,Y.D. Kazer,K.S. Zaytsev     Pág. 39 - 45
The purpose of this work is to reduce the cost of troubleshooting digital equipment by improving anomaly recognition methods based on the use of autoencoders. To do this, the authors propose to use two types of autoencoders: a deep feed-forward autoencod... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
D.A. Safronov,Y.D. Kazer,K.S. Zaytsev     Pág. 39 - 45
The purpose of this work is to reduce the cost of troubleshooting digital equipment by improving anomaly recognition methods based on the use of autoencoders. To do this, the authors propose to use two types of autoencoders: a deep feed-forward autoencod... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Raha Soleymanzadeh, Mustafa Aljasim, Muhammad Waseem Qadeer and Rasha Kashef    
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information. Mode... ver más
Revista: AI    Formato: Electrónico

 
en línea
Yanping Shen, Kangfeng Zheng, Yanqing Yang, Shuai Liu and Meng Huang    
Various machine-learning methods have been applied to anomaly intrusion detection. However, the Intrusion Detection System still faces challenges in improving Detection Rate and reducing False Positive Rate. In this paper, a Class-Level Soft-Voting Ensem... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ahmed Salih AL-Khaleefa, Mohd Riduan Ahmad, Azmi Awang Md Isa, Mona Riza Mohd Esa, Ahmed AL-Saffar and Mustafa Hamid Hassan    
Online learning is the capability of a machine-learning model to update knowledge without retraining the system when new, labeled data becomes available. Good online learning performance can be achieved through the ability to handle changing features and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas and Robertas Dama?evicius    
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Kotey Seth Djanie, Tchao Eric Tutu and Gadze James Dzisi    
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 p... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Mohammed Aitdaoud,Khalil Namir,Mohssine Bentaib,Rachida Ihya,Soufiane Bouiti,Mohammed Talbi     Pág. 59 - 65
The goal of every company and public sector organization is to provide quality service to their customers and make them satisfied. However, as we move to-wards a more connected world where technology has been integrated into the business process, handlin... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Johan Mardini, Alberto Egea Colmenares    
Dado que la información se ha constituido en uno de los activos más valiosos de las organizaciones, es necesario salvaguardarla a través de diferentes estrategias de protección, con el fin de evitar accesos intrusivos o cualquier tipo de incidente que ca... ver más
Revista: Investigación e Innovación en IngenierÍ­as    Formato: Electrónico

 
en línea
Wesley Romão, Alex Alves Freitas, Roberto dos Santos Pacheco (Author)     Pág. 1347 - 1359
Knowledge Discovery in Databases (KDD) process consists of many stages among which the main one is Data Mining (DM). There are many DM tasks but the discovery of classification rules is the most known. The classification task can be addressed by conventi... ver más
Revista: Acta Scientiarum: Technology    Formato: Electrónico

 
en línea
Tianhao Hou, Hongyan Xing, Xinyi Liang, Xin Su and Zenghui Wang    
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the nation?s meteorological and hydrological information is at ever-increasing risk, which calls for a prompt and in depth analysis of the network behavior and traffic to d... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »