Inicio  /  Nauka ta Progres Transportu  /  Núm: 5 Par: 0 (2020)  /  Artículo
ARTÍCULO
TITULO

DETECTION OF ATTACKS ON A COMPUTER NETWORK BASED ON THE USE OF NEURAL NETWORKS COMPLEX

I. V. Zhukovyts'kyy    
V. M. Pakhomova    
D. O. Ostapets    
O. I. Tsyhanok    

Resumen

No disponible

 Artículos similares

       
 
Chinyang Henry Tseng, Woei-Jiunn Tsaur and Yueh-Mao Shen    
In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrus... ver más
Revista: Future Internet

 
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber    
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w... ver más
Revista: Future Internet

 
Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim    
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users? personal information and privacy, has led to a cont... ver más
Revista: Future Internet

 
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam    
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e... ver más
Revista: Future Internet

 
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet