4.6 Article

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

Shuming Qiu et al.

Summary: This article proposes a provably secure three-factor AKA protocol based on extended chaotic-maps for mobile lightweight devices. By utilizing Fuzzy-Verifiers and Honeywords techniques, the protocol achieves a good balance between security and usability.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection

Hanan Hindy et al.

ELECTRONICS (2020)

Article Computer Science, Theory & Methods

Cybersecurity data science: an overview from machine learning perspective

Iqbal H. Sarker et al.

JOURNAL OF BIG DATA (2020)

Article Computer Science, Information Systems

A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems

Hanan Hindy et al.

IEEE ACCESS (2020)

Review Chemistry, Multidisciplinary

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

Hongyu Liu et al.

APPLIED SCIENCES-BASEL (2019)

Review Computer Science, Artificial Intelligence

Ensembles for feature selection: A review and future trends

Veronica Bolon-Canedo et al.

INFORMATION FUSION (2019)

Article Computer Science, Information Systems

Deep Learning Approach for Intelligent Intrusion Detection System

R. Vinayakumar et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Theory & Methods

Improving AdaBoost-based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset

Arif Yulianto et al.

2ND INTERNATIONAL CONFERENCE ON DATA AND INFORMATION SCIENCE (2019)

Article Computer Science, Theory & Methods

Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey

Seyed Mohammad Ghaffarian et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Artificial Intelligence

Simultaneous feature selection and clustering using mixture models

MHC Law et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2004)

Article Computer Science, Artificial Intelligence

Unsupervised feature selection using feature similarity

P Mitra et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)