4.7 Article

A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Construction & Building Technology

Enabling technologies and sustainable smart cities

Mohd Abdul Ahad et al.

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Construction & Building Technology

Scalable machine learning-based intrusion detection system for IoT-enabled smart cities

Md Arafatur Rahman et al.

SUSTAINABLE CITIES AND SOCIETY (2020)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Theory & Methods

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset

Nickolaos Koroniotis et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

A survey of network-based intrusion detection data sets

Markus Ring et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Theory & Methods

A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration

Jasenka Dizdarevic et al.

ACM COMPUTING SURVEYS (2019)

Article Information Science & Library Science

IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning

Daming Li et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)

Proceedings Paper Computer Science, Cybernetics

DASHbed: a testbed Framework for Large Scale Empirical Evaluation of Real-Time DASH in Wireless Scenarios

Darijo Raca et al.

PROCEEDINGS OF THE 10TH ACM MULTIMEDIA SYSTEMS CONFERENCE (ACM MMSYS'19) (2019)

Review Engineering, Multidisciplinary

Scanning the Industry 4.0: A Literature Review on Technologies for Manufacturing Systems

V. Alcacer et al.

ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2019)

Article Computer Science, Information Systems

Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement

Placide Shabisha et al.

IEEE ACCESS (2019)

Article Engineering, Manufacturing

A blockchain enabled Cyber-Physical System architecture for Industry 4.0 manufacturing systems

Jay Lee et al.

MANUFACTURING LETTERS (2019)

Article Computer Science, Information Systems

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems

Nour Moustafa et al.

IEEE ACCESS (2018)

Review Construction & Building Technology

Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities

Bhagya Nathali Silva et al.

SUSTAINABLE CITIES AND SOCIETY (2018)

Article Computer Science, Information Systems

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units

Congyuan Xu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

Yair Meidan et al.

IEEE PERVASIVE COMPUTING (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Random Forest Modeling for Network Intrusion Detection System

Nabila Farnaaz et al.

TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 (2016)

Article Computer Science, Information Systems

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

Ali Shiravi et al.

COMPUTERS & SECURITY (2012)