4.6 Article

Malicious mining code detection based on ensemble learning in cloud computing environment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Interdisciplinary Applications

A computing resources prediction approach based on ensemble learning for complex system simulation in cloud environment

Shuai Wang et al.

Summary: This paper explores the importance of accurate computing resource prediction for complex system simulation applications in a cloud environment, proposing a computing resource prediction approach based on ensemble learning. The intelligent ensemble algorithm is shown to achieve higher accuracy compared to existing resource prediction models.

SIMULATION MODELLING PRACTICE AND THEORY (2021)

Article Computer Science, Interdisciplinary Applications

Power system structure optimization based on reinforcement learning and sparse constraints under DoS attacks in cloud environments

Zhiqin Zhu et al.

Summary: This paper proposes a power system structure optimization strategy based on sparse constraint optimization and cloud computing to solve the lack of computing power from local computers and prevent DoS attacks. By optimizing sensor layout and reducing sensor data transmission, the blocking probability of sensor data caused by DoS attacks is reduced.

SIMULATION MODELLING PRACTICE AND THEORY (2021)

Article Computer Science, Information Systems

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques

Muhammad Shafiq et al.

Summary: Researchers have proposed a new feature selection method and algorithm to accurately detect malicious traffic in IoT networks. By integrating TOPSIS and Shannon entropy methods to validate the selected features for malicious traffic identification in IoT networks, the experimental results have shown that this method is efficient and can achieve over 96% accuracy on average.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Chaochao Luo et al.

Summary: The IoT technology has been widely applied in various fields, but the diversity of devices makes networks more vulnerable to web attacks. Researchers proposed a deep learning-based web attack detection system that can accurately detect web attacks with low false positive and negative rates.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Interdisciplinary Applications

Deep recurrent neural network for IoT intrusion detection system

Muder Almiani et al.

SIMULATION MODELLING PRACTICE AND THEORY (2020)

Article Mathematics, Applied

Functional immunization of networks based on message passing

Shudong Li et al.

APPLIED MATHEMATICS AND COMPUTATION (2020)

Article Computer Science, Information Systems

IoT malicious traffic identification using wrapper-based feature selection mechanisms

Muhammad Shafiq et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Theory & Methods

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city

Muhammad Shafiq et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Engineering, Electrical & Electronic

Software Vulnerability Detection Using Deep Neural Networks: A Survey

Guanjun Lin et al.

PROCEEDINGS OF THE IEEE (2020)

Article Computer Science, Interdisciplinary Applications

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation

Fabio Martinelli et al.

SIMULATION MODELLING PRACTICE AND THEORY (2020)

Article Computer Science, Theory & Methods

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

Xiao Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks

Gang Sun et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding

Jixin Zhang et al.

COMPUTERS & SECURITY (2019)

Article Automation & Control Systems

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment

Zhihong Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

INTELLIGENT COGNITIVE RADIO IN 5G: AI-BASED HIERARCHICAL COGNITIVE CELLULAR NETWORKS

Dan Wang et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning

Hangfeng Yang et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications

Yong Yu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Engineering, Electrical & Electronic

Bus-Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad Hoc Networks

Gang Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)