بحث بسيط
السجلات المعروضة 11 -- 19 من 19
Iterative per Group Feature Selection for Intrusion Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ...
Weighted Trustworthiness for ML Based Attacks Classification
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Recently, machine learning techniques are gaining a lot of interest in security applications as they exhibit fast processing with real-time predictions. One of the significant challenges in the implementation of these ...
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the emergence of the Internet of Things (IoT) technology, wireless connectivity should be more ubiquitous than ever. In fact, the availability of wireless connection everywhere comes with security threats that, ...
Comprehensive review of cybercrime detection techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ...
Integrating Blockchain Technology in 5G enabled IoT: A Review
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In the digitized world, Internet of thing(IoT) is growing rapidly and most of the devices are connected by internet technology. IoT connected more than 5 million devices across the world and it needs high power internet ...
Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In remote rural areas without continuous Internet connectivity, it is hard to envisage the use of mHealth applications for remote patient monitoring. In such areas, patients need to travel long distances to reach the nearest ...
Deep learning based identification of DDoS attacks in industrial application
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Denial of Service (DoS) attacks are very common type of computer attack in the world of internet today. Automatically detecting such type of DDoS attack packets dropping them before passing through is the best prevention ...