4.2 Article

Dynamic management of a deep learning-based anomaly detection system for 5G networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

Amandeep Singh Sohal et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks

Lorenzo Fernandez Maimo et al.

IEEE ACCESS (2018)

Article Computer Science, Software Engineering

Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets

Manuel Gil Perez et al.

IEEE INTERNET COMPUTING (2017)

Article Computer Science, Software Engineering

Fog Computing for the Internet of Things: Security and Privacy Issues

Arwa Alrawais et al.

IEEE INTERNET COMPUTING (2017)

Article Computer Science, Artificial Intelligence

Semantic Pooling for Complex Event Analysis in Untrimmed Videos

Xiaojun Chang et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2017)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)

Article Computer Science, Hardware & Architecture

Future mode of operations for 5G-The SELFNET approach enabled by SDN/NFV

Pedro Neves et al.

COMPUTER STANDARDS & INTERFACES (2017)

Article Computer Science, Information Systems

New facets of mobile botnet: architecture and evaluation

Marios Anagnostopoulos et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2016)

Article Computer Science, Theory & Methods

On the Security of Machine Learning in Malware C&C Detection: A Survey

Joseph Gardiner et al.

ACM COMPUTING SURVEYS (2016)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

Network Function Virtualization: State-of-the-Art and Research Challenges

Rashid Mijumbi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Artificial Intelligence

Compound Rank-k Projections for Bilinear Analysis

Xiaojun Chang et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2016)

Article Telecommunications

Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications

M. S. Siddiqui et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2016)

Article Computer Science, Information Systems

An empirical comparison of botnet detection methods

S. Garcia et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Information Systems

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. Garcia-Teodoro et al.

COMPUTERS & SECURITY (2009)