Search

Your search keyword '"attack classification"' showing total 88 results

Search Constraints

Start Over You searched for: Descriptor "attack classification" Remove constraint Descriptor: "attack classification"
88 results on '"attack classification"'

Search Results

1. AResNet Model Using Deep Learning Approach for Enhancing the Internet of Things (IoT) Forensic Readiness Framework.

2. Random forest with differential privacy in federated learning framework for network attack detection and classification.

3. Optimization of Intrusion Detection with Deep Learning: A Study Based on the KDD Cup 99 Database.

4. An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction.

5. A detailed study of resampling algorithms for cyberattack classification in engineering applications.

6. Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system

7. ADVANCES IN NETWORK SECURITY FOR A RESILIENT DIGITAL CYBERSPACE INFRASTRUCTURE.

8. Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning.

9. A detailed study of resampling algorithms for cyberattack classification in engineering applications

10. Recurrence Plots-Based Network Attack Classification Using CNN-Autoencoders

11. A Comprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths

12. A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification

13. Intelligent Approach for Analysis and Diagnosis of Attack, Fault and Load Variation in SCADA Systems: A Power System Application

14. ATiPreTA: AN Analytical Model for Time–Dependent Prediction of Terrorist Attacks

15. Hunting Network Anomalies in a Railway Axle Counter System.

16. An intrusion detection system based on hybrid machine learning classifier.

17. Argumentation Frameworks with Attack Classification.

18. Efficient Deep Learning Approach To IoT Intrusion Detection.

19. NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices

21. Anomaly Detection and Attack Classification for Train Real-Time Ethernet

22. Hunting Network Anomalies in a Railway Axle Counter System

23. Machine learning with digital forensics for attack classification in cloud network environment.

25. Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection.

26. Deep learning with focal loss approach for attacks classification.

27. An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication

28. Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks.

30. An adaptive LeNet-5 model for anomaly detection.

31. Hunting Network Anomalies in a Railway Axle Counter System

32. Hunting Network Anomalies in a Railway Axle Counter System

33. Hunting Network Anomalies in a Railway Axle Counter System

34. A comprehensive survey of V2X cybersecurity mechanisms and future research paths

35. An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization

36. A comprehensive novel model for network speech anomaly detection system using deep learning approach.

37. Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model.

38. Classification of Logical Vulnerability Based on Group Attacking Method.

39. A Review of the Advancement in Intrusion Detection Datasets.

40. A Novel Security Architecture Based on Multi-level Rule Expression Language

42. Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection and Attack Classification

43. Network Intrusion Prevention by Using Hierarchical Self-Organizing Maps and Probability-Based Labeling

44. Identifying localization attacks in wireless sensor networks using deep learning.

45. Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems

46. Data driven intrusion detection for 6LoWPAN based IoT systems.

47. An Attack Classification Mechanism Based on Multiple Support Vector Machines

48. Anomaly Detection and Attack Classification for Train Real-Time Ethernet

49. Watermarking based image authentication and tamper detection algorithm using vector quantization approach.

50. Automatic Classification of Attacks on IP Telephony

Catalog

Books, media, physical & digital resources