Search
Now showing items 11-20 of 21
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise ...
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
IoT root union: A decentralized name resolving system for IoT based on blockchain
(
Elsevier Ltd
, 2021 , Article)
A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
With the widespread use of online social networks, billions of pieces of information are generated every day. How to detect new topics quickly and accurately at such data scale plays a vital role in information recommendation ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
(
Elsevier B.V.
, 2020 , Article)
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ...
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
(
IEEE Computer Society
, 2022 , Article)
With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ...
Applying artificial bee colony algorithm to the multidepot vehicle routing problem
(
John Wiley and Sons Ltd
, 2022 , Conference Paper)
With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ...