相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Machine Learning-based Orchestration of Containers: A Taxonomy and Future Directions
Zhiheng Zhong et al.
ACM COMPUTING SURVEYS (2022)
An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs
Gaoyuan Liu et al.
SENSORS (2022)
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity
Theyazn H. H. Aldhyani et al.
SENSORS (2022)
Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
Said El Kafhali et al.
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING (2022)
Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems
Hasan Alkahtani et al.
ELECTRONICS (2022)
The DDoS attacks detection through machine learning and statistical methods in SDN
Afsaneh Banitalebi Dehkordi et al.
JOURNAL OF SUPERCOMPUTING (2021)
An efficient feature reduction method for the detection of DoS attack
Deepak Kshirsagar et al.
ICT EXPRESS (2021)
Optimized extreme learning machine for detecting DDoS attacks in cloud computing
Gopal Singh Kushwah et al.
COMPUTERS & SECURITY (2021)
Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning
Ammar Aldallal et al.
SYMMETRY-BASEL (2021)
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications
Hasan Alkahtani et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
EDoS-ADS: An Enhanced Mitigation Technique Against Economic Denial of Sustainability (EDoS) Attacks
Ahmad Shawahna et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)
An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm
M. R. Gauthama Raman et al.
ARTIFICIAL INTELLIGENCE REVIEW (2020)
Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Efficiency against Single-Flow CNN Models for the Host-Based Intrusion and Malware Detection Task on Univariate Times Series Data
Dainius Ceponis et al.
APPLIED SCIENCES-BASEL (2020)
被撤回的出版物: Adaptive Anomaly Detection Framework Model Objects in Cyberspace (Retracted article. See vol. 2023, 2023)
Hasan Alkahtani et al.
APPLIED BIONICS AND BIOMECHANICS (2020)
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
Mahmoud Said Elsayed et al.
2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020) (2020)
DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids
Mohamed Amine Ferrag et al.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2020)
Intrusion Detection Based on Autoencoder and Isolation Forest in Fog Computing
Kishwar Sadaf et al.
IEEE ACCESS (2020)
Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network
S. Manimurugan et al.
IEEE ACCESS (2020)
Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies
Xavier A. Larriva-Novo et al.
IEEE ACCESS (2020)
Dynamic Autoselection and Autotuning of Machine Learning Models for Cloud Network Analytics
Rupesh Raj Karn et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2019)
Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud
Trung Phan et al.
IEEE ACCESS (2019)
LSTM-BA: DDoS Detection Approach Combining LSTM and Bayes
Yan Li et al.
2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2019)
Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
Naveen Bindra et al.
AUTOMATIC CONTROL AND COMPUTER SCIENCES (2019)
FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing
Sukhada Bhingarkar et al.
INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING (2018)
Entropy-Based Economic Denial of Sustainability Detection
Marco Antonio Sotelo Monge et al.
ENTROPY (2017)
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
Chuanlong Yin et al.
IEEE ACCESS (2017)
MLP-GA based algorithm to detect application layer DDoS attack
Khundrakpam Johnson Singh et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)
DDoS in the IoT: Mirai and Other Botnets
Constantinos Kolias et al.
COMPUTER (2017)
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
Karanpreet Singh et al.
COMPUTERS & SECURITY (2017)
Performance Modeling and Analysis of the EDoS-Shield Mitigation
F. Al-Haidari et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)
Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks
Zubair A. Baig et al.
COMPUTER NETWORKS (2016)
DDoS attacks in cloud computing: Collateral damage to non-targets
Gaurav Somani et al.
COMPUTER NETWORKS (2016)
Detection and defense of application-layer DDoS attacks in backbone web traffic
Wei Zhou et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks Against Cloud Infrastructures
Zubair A. Baig et al.
2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA) (2013)
Random forest classifier for remote sensing classification
M Pal
INTERNATIONAL JOURNAL OF REMOTE SENSING (2005)
Data mining of tree-based models to analyze freeway accident frequency
LY Chang et al.
JOURNAL OF SAFETY RESEARCH (2005)