4.5 Article

Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

Xiaorui Zhang et al.

Summary: In this paper, a 3D medical watermarking algorithm based on wavelet transform is proposed, which utilizes PCA transform to reduce data dimension and a BF-PSO model to find the optimal embedding parameters, achieving the optimal balance between embedding capacity and imperceptibility. Experimental results based on a standard MRI brain volume dataset in MATLAB software show that the proposed algorithm has strong robustness and minimal deformation of the 3D model after watermark embedding.

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2022)

Article Mathematics

An Efficient Network Intrusion Detection and Classification System

Iftikhar Ahmad et al.

Summary: Intrusion detection in computer networks is important for communication and security domains, but remains a challenging task. This paper compares multiple techniques to develop a network intrusion detection system and proposes an AdaBoost-based approach. Experimental results show that the proposed method effectively detects different forms of network intrusions and achieves 99.3% accuracy on the UNSW-NB15 dataset.

MATHEMATICS (2022)

Article Computer Science, Information Systems

Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection

Xiaorui Zhang et al.

Summary: This paper proposes a two-stage reversible robust audio watermarking algorithm for protecting medical audio data. By decomposing the audio into two independent embedding domains and embedding different watermarks, the algorithm ensures both watermark robustness and audio quality. Experimental results demonstrate that the proposed scheme has strong robustness against various signal processing operations.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

Article Computer Science, Information Systems

Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

Muhammad Nadeem et al.

Summary: This article discusses the security issues of cloud computing and defense mechanisms, focusing on monitoring the attack rate of the network using an Intrusion Detection System, and providing various solutions to protect the cloud server from attacks.

IEEE ACCESS (2021)

Article Physics, Multidisciplinary

Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: A differential e-epidemic model

Yerra Shankar Rao et al.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Clustered negative selection algorithm and fruit fly optimization for email spam detection

Ramdane Chikh et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Semi-Supervised K-Means DDoS Detection Method Using Hybrid Feature Selection Algorithm

Yonghao Gu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A novel lightweight URL phishing detection system using SVM and similarity index

Mouad Zouina et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)